Woo–Lam

From testwiki
Revision as of 23:51, 30 September 2023 by imported>Trappist the monk (cite repair;)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

In cryptography, Woo–Lam refers to various computer network authentication protocols designed by Simon S. Lam and Thomas Woo.[1][2] The protocols enable two communicating parties to authenticate each other's identity and to exchange session keys, and involve the use of a trusted key distribution center (KDC) to negotiate between the parties. Both symmetric-key and public-key variants have been described. However, the protocols suffer from various security flaws, and in part have been described as being inefficient compared to alternative authentication protocols.[3]

Public-key protocol

Notation

The following notation is used to describe the algorithm:

A,B - network nodes.
KUx - public key of node x.
KRx - private key of x.
Nx - nonce chosen by x.
IDx - unique identifier of x.
Ek - public-key encryption using key k.
Sk - digital signature using key k.
K - random session key chosen by the KDC.
|| - concatenation.

It is assumed that all parties know the KDC's public key.

Message exchange

1)AKDC:IDA||IDB
2)KDCA:SKRKDC[IDB||KUB]
3)AB:EKUB[NA||IDA]
4)BKDC:IDB||IDA||EKUKDC[NA]
5)KDCB:SKRKDC[IDA||KUA]||EKUB[SKRKDC[NA||K||IDB||IDA]]
6)BA:EKUA[SKRKDC[NA||K]||NB]
7)AB:EK[NB]

The original version of the protocol[4] had the identifier IDA omitted from lines 5 and 6, which did not account for the fact that NA is unique only among nonces generated by A and not by other parties. The protocol was revised after the authors themselves spotted a flaw in the algorithm.[1][3]

See also

References

Template:Reflist

Template:Authentication APIs


Template:Crypto-stub