Score:0

algebraic properties affecting a protocol

ru flag

This is from a past exam paper. The question is as follows:

A protocol designer uses signature to simplify, and hopefully correct, NSPK:

  1. $A → B$ : $sign(sk_A, encrypt(pk_B, N_A))$
  2. $B → A$ : $sign(sk_B, encrypt(pk_A,(N_A, k)))$

where $N_A$ is a fresh random nonce created by $A$, $k$ is a fresh session key created by $B$, and the sign and encrypt operations use the public key cryptosystem to respectively sign and encrypt under the respective keys. You should assume that $A$ and $B$ know each others’ public keys $pk_A$ and $pk_B$.

Does this work (i) in the case where signature and encryption satisfy no algebraic properties other than those implied by their definitions and (ii) if signature and encryption commute (i.e. $sign(k_1, encrypt(k_2, x))$ = $encrypt(k_2,(sign(k_1, x)))$?

In each case either argue convincingly that the revised protocol works or analyse exactly what your attack on it achieves.

I can't come up with a man in the middle attack or a reflection attack for this protocol - and don't really see how the algebraic properties of these functions are relevant either way? How do I solve this question?

mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.