Yahalom (protocol)

From testwiki
Revision as of 16:57, 2 June 2022 by imported>GreenC bot (Move 2 urls. Wayback Medic 2.5)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Template:No footnotes Yahalom is an authentication and secure key-sharing protocol designed for use on an insecure network such as the Internet. Yahalom uses a trusted arbitrator to distribute a shared key between two people. This protocol can be considered as an improved version of Wide Mouth Frog protocol (with additional protection against man-in-the-middle attack), but less secure than the Needham–Schroeder protocol.

Protocol description

If Alice (A) initiates the communication to Bob (B) with S is a server trusted by both parties, the protocol can be specified as follows using security protocol notation:

  • A and B are identities of Alice and Bob respectively
  • KAS is a symmetric key known only to A and S
  • KBS is a symmetric key known only to B and S
  • NA and NB are nonces generated by A and B respectively
  • KAB is a symmetric, generated key, which will be the session key of the session between A and B

AB:A,NA

Alice sends a message to Bob requesting communication.

BS:B,{A,NA,NB}KBS

Bob sends a message to the Server encrypted under KBS.

SA:{B,KAB,NA,NB}KAS,{A,KAB}KBS

The Server sends to Alice a message containing the generated session key KAB and a message to be forwarded to Bob.

AB:{A,KAB}KBS,{NB}KAB

Alice forwards the message to Bob and verifies NA has not changed. Bob will verify NB has not changed when he receives the message.

BAN-Yahalom

Burrows􏰂, Abadi􏰂 and Needham proposed a variant of this protocol in their 1989 paper as follows:[1]

AB:A,NA
BS:B,NB,{A,NA}KBS
SA:NB,{B,KAB,NA}KAS,{A,KAB,NB}KBS
AB:{A,KAB,NB}KBS,{NB}KAB

In 1994, Paul Syverson demonstrated two attacks on this protocol.[1]

See also

References

  1. 1.0 1.1 Paul Syverson. A taxonomy of replay attacks. In Proceedings of the 7th IEEE Computer Security Foundations Workshop, pages 131􏰀–136. IEEE Computer Society Press, 1994.

Template:Crypto-stub