Week 5 Flashcards
What is a Nonce and how it is used?
Number that is used only once.
Nonce is decrypted, one is added, encrypted again.
Prevents against replays.
What is a Key Establishment Protocol?
Principals set up a session key.
To be sure they are communicating with the correct principal, they must either know each others public keys or use a TTP.
Describe the Needham-Schroeder public key protocol?
Assume A and B know eachothers public keys:
A -> B: Eb(Na, A)
B -> A: Ea(Na, Nb)
A -> B: Eb(Nb)
Na and Nb can then be used to generate a symmetric key.
What is an attack against NH protocol, and how do we prevent it happening?
Man-in-the-middle.
- B -> A : Ea(Na, Nb, B)
What is Forward Secrecy?
When a message is kept secret from an attacker who has:
- Recording of the protocol run.
- Long term keys of the principals.
Describe Station-to-Station Protocol?
A -> B: gx
B -> A: gy, {Sb(gy, gx)}gxy
A -> B: {Sa(gy, gx)}gxy
B -> A: {M}gxy
x, y, gxy not stored.
Ensures forward secrecy.
What is a Certificate?
TTP signs their identity and public key.
Describe NS key establishment protocol?
A and B use trusted third party S to establish Kab.
What are some key establishment goals?
Key freshness - either from trusted third party or using a new nonce.
Key exclusivity.
What are some authentication goals?
Far-end operative: A knows that B is currently active.
Once authentication: A knows that B wishes to communicate with A.
These together form Entity Authentication.
When does a protocol provide Mutual Belief?
When its key is a good key and it has entity authentication.