• Aucun résultat trouvé

Security Models

N/A
N/A
Protected

Academic year: 2022

Partager "Security Models"

Copied!
1
0
0

Texte intégral

(1)

Security Models

2020/2021 P. Lafourcade and L.Robert

Session 4

Exercise 1

We consider the following protocol:

1. A→B:{hA, NAi}pk(B) 2. B→A:{hNA, NBi}pk(A) 3. A→B:{NB}pk(B)

Give the role description of the protocol.

Exercise 2

We consider the following protocol called FFFGGG:

1A→B : A

2B →A : B, N, M, O

3A→B : A,{N, M, O, S}pk(B) 4B →A : N, X,{X, Y, S, N}pk(B)

We omit to write pairing, you can do the same in your solution. In step 3, if B receives the message A,{N, X, Y, S}pk(B) then he only checks the correspondance of N and sees the other data as variables.

• Give the role description of the protocol.

• Give an attack on this protocol showing thatS is not secret Exercise 3

A→B: hA, NAi B →A: {hNA, NBi}Kab A→B: NB

B →A: {hK, NBi}Kab A→B: {s}K

Intruder knows only identities of Aand B.

• There exists an attack allowing the intruder to know the secrets, can you find it?

• Give the associated interleaving for this attack and write the constraints system associated.

• Use simplification rules to transform the system in solved form.

Exercise 4

A→B : {hA, Ki}Kab B→A: {s}Kab

Intruder knows only identities of A and B. Show that the secret data s is preserved by one single session betweenA and B.

1

Références

Documents relatifs

Also use the formulas for det and Trace from the

[r]

.} be the set of positive integers which have the last digit 1 when written in base 10.. Determine all Dirichlet characters modulo 8 and

Is product of two smooth manifolds with boundary a smooth manifold with

Show that a (connected) topological group is generated (as a group) by any neighborhood of its

[r]

Formally prove that this equation is mass conser- vative and satisfies the (weak) maximum principle.. 4) Dynamic estimate on the entropy and the first

The purpose of this note is to give a generaltzation of this fact in a non-linear potential theory developed by s.. There is another proof for this result, based