Protocol Analysis Flashcards
What is known as a Dolev-Yao intruder?
Consider a public key system in which for every user X, there is a public encryption function Ex, which may be used by any user, and a private encryption function Dx, which only X may use.
A Dolev-Yao intruder is a thought experiment where we consider an intruder on a network that:
..exists as a user,
..can use any user’s public encryption function Ex,
..and may encrypt any message with its own private encryption function Dz.
What are Dolev-Yao closures?
Dolev-Yao closures are a mathematical proof operation used to test the security of network protocols.
We consider a set of terms M, and define DY(M) as the least closure of M, where DY(M) is information the intruder can trivially compute starting from an initial set of known data M.
What does the axiomatic rule of a Dolev-Yao closure represent?
The axiomatic rule states that given a message m, if the intruder knows m and m itself, we still know m.
It represents the idea that an intruder may derive or maintain knowledge about data it has intercepted.
What does the algebraic rule of a Dolev-Yao closure represent?
The algebraic rule states that the intruder may compute an algebraic expression consisting of values they know.
It represents the idea that an intruder may be able to manipulate or composite messages they have seen in the past.
This may be used in order to shift around variables - for example, turning exp(exp(x, y), z) into exp(exp(x, z), y).
What does the composition rule of a Dolev-Yao closure represent?
The composition rule states that the intruder may compute any function within the logical model of a set of values they know.
In other words, if the intruder knows a function, it may use that function.
What does the projection rule of a Dolev-Yao closure represent?
The projection rule states that the intruder, given a pair of values {x, y}, may separate x as a single atomic fact.
In other words, given a pair of values, we know one of them.
What does the decryption of symmetric rule of a Dolev-Yao closure represent?
The DecSym rule states that if the intruder knows a symmetrically encrypted ciphertext, and the key used to encrypt it, they can find out the corresponding plaintext.
What does the decryption of asymmetric rule of a Dolev-Yao closure represent?
The DecAsym rule states that if the intruder knows a public key encrypted ciphertext, and the corresponding private key, they can find out the corresponding plaintext.
What does the open signature rule of a Dolev-Yao closure represent?
The OpenSig rule states that if the intruder knows the signature of a message digest, they can compute the message digest.
What are agents in a protocol?
An agent is a software module that carries out a role placed on it by the network protocol in use.
What is a role in a protocol?
A role is a set of instructions to be carried out by an agent on the network when executing a network protocol.
What is a nonce in protocol design?
A nonce (number used once) is a unique number randomly generated by an agent to prove the freshness of a message.
What could go wrong if we use a nonce that is not freshly generated?
A non-fresh nonce opens up the protocol to attacks via replay, where an attacker waits for a certain gap in the protocol, then sends the message.
Normally, a nonce solves this, by ensuring that the communication is fresh. However, if the nonce is not always updated, a keen intruder may simply replay an older message and convince an agent that they are someone they aren’t.
Why do we encrypt our messages?
As seen in Scenario, Version 1 in 10 - Protocol Design:
Without using encryption, the intruder can merely intercept the message and read the message in plaintext.
What is a nonce used for?
As seen in Scenario, Version 4 in 10 - Protocol Design:
Without a nonce, protocols become susceptible to replay attacks, where the intruder simply waits for a bit before “replaying” the same message later, allowing them to reinitiate conversation as “Alice” and update or retransmit their keys, when they are in actuality the intruder.