1 / 10

Exercises: Basic cryptography & key exchange protocols

Exercises: Basic cryptography & key exchange protocols. Exercise 1. Alice and Bob want to verify that they possess a common key K , using a public one-way function h . They use the following protocol: Alice sends to Bob: h(h(K)) Bob verifies that the received value is correct

upton
Download Presentation

Exercises: Basic cryptography & key exchange protocols

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Exercises:Basic cryptography & key exchange protocols

  2. Exercise 1 • Alice and Bob want to verify that they possess a common key K, using a public one-way function h. They use the following protocol: • Alice sends to Bob: h(h(K)) • Bob verifies that the received value is correct • Bob sends to Alice: h(K) • Alice verifies that the received value is correct

  3. Exercise 1 • Question 1: Why not have Alice send h(K) to Bob and then Bob send h(h(K)) to Alice? • Question 2: What keeps Malice from intercepting Alice’s transaction of h(h(K)) and then sending h(K) back to Alice (assuming that Malice does not know K) • Question 3: Beside h(h(K)), what can Alice send to Bob?

  4. Exercise 2 • Consider the following protocol: • Alice sends to Trent: Alice, Bob, {K}KAT • Trent sends to Bob: Alice, Bob, {K}KBT • Bob sends Alice: {Hi, Alice. I am Bob}K  How to attack this protocol?

  5. Exercise 3 • In the step 5 of the protocol “challenge-response“, why does Alice send to Bob the value (NB - 1)?

  6. Exercise 4 • In the “Session key from Trent” protocol: • Alice sends Trent: Alice, Bob • Trent sends Alice: {K}KAT , {K}KBT • Alice sends Bob: Trent, Alice, {K}KBT • Bob sends Alice: {Hi, Alice. I am Bob}K

  7. Exercise 4 • In the “Session key from Trent” protocol, why does Trent send Alice two packages of key instead of sending one to Alice and one to Bob? • How to attack this protocol?

  8. Question ?

  9. A B r S r T t t t g D g M C g N g g g g g g g g E g O Faculty of Math Faculty of CSE Exercise

  10. Exercise • Can C, D, E read A? • Can M, N, O read A? • Can C, D, E read B? • Can S read B? • Can T read A?

More Related