《Modern Cryptogrophy:Theory and practice》学习笔记之第二章 part II

下面是Attack 和Fix之间不断反复的例子(以认证的密钥建立协议为例  Protocols for Authenticated Key Establishment Using Encryption)

Prot2.1: Protocol “From Alice to Bob”

  1. Alice generates K at random, creates {K}KAT, and sends to Trent: Alice, Bob, {K}KAT;
  2. Trent finds keys KAT, KBT, decrypts {K}KAT to reveal K, creates {K}KBT and sends to Bob: Alice, Bob, {K}KBT;
  3. Bob decrypts {K}KBT to reveal K, forms and sends to Alice: {Hello Alice, I'm Bob!}K.

由于Alice所产生的K可能不够安全,不能取得Bob的信任,所以改为由Trent来生成K

Prot2.2: Protocol “Session Key from Trent”

  1. Alice sends to Trent: Alice, Bob;
  2. Trent finds keys KAT, KBT, generates K at random and sends to Alice: {K}KAT, {K}KBT;
  3. Alice decrypts {K}KAT, and sends to Bob: Trent, Alice, {K}KBT;
  4. Bob decrypts {K}KBT to reveal K, forms and sends to Alice: {Hello, I'm Bob!}K.

Attack2.2: An attack on Prot2.2

Alice -> Malice(“Trent”): Alice, Bob;

Malice(“Alice”)->Trent: Alice, Malice;

Trent finds KAT, KMT, generates KAM, ->Alice: {KAM}KAT, {KAM}KMT;

Alice decrypts{KAM}KMT, ->Malice(“Bob”): Trent, Alice, {KAM}KMT;

Malice(“Bob”)->Alice : {Hello, Im Bob!}KAM;

 

 

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值