hws/hw05.tex
author Christian Urban <christian dot urban at kcl dot ac dot uk>
Tue, 20 Oct 2015 01:01:17 +0100
changeset 414 9a3aa8c39951
parent 349 9f4f626cefea
child 442 cceb3d2dcba0
permissions -rw-r--r--
update
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
97
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
     1
\documentclass{article}
276
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
     2
\usepackage{../style}
97
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
     3
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
     4
\begin{document}
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
     5
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
     6
\section*{Homework 5}
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
     7
414
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 349
diff changeset
     8
\HEADER
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 349
diff changeset
     9
97
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
    10
\begin{enumerate}
276
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    11
\item What can attacker that controls the network do to a communication
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    12
between a client and a server?
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    13
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    14
\item Before starting a TCP connection, client and servers
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    15
perform a three-way handshake. Describe how can this three-way
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    16
handshake can be abused by an attacker? 
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    17
239
0db764174afb updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 155
diff changeset
    18
\item Consider the following simple mutual authentication protocol:
0db764174afb updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 155
diff changeset
    19
0db764174afb updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 155
diff changeset
    20
\begin{center}
0db764174afb updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 155
diff changeset
    21
\begin{tabular}{ll}
276
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    22
$A \to B$: & $N_a$\\  
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    23
$B \to A$: & $\{N_a, N_b\}_{K_{ab}}$\\
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    24
$A \to B$: & $N_b$\\
239
0db764174afb updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 155
diff changeset
    25
\end{tabular}
0db764174afb updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 155
diff changeset
    26
\end{center}
0db764174afb updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 155
diff changeset
    27
0db764174afb updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 155
diff changeset
    28
Explain how an attacker $B'$ can launch an impersonation attack by 
0db764174afb updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 155
diff changeset
    29
intercepting all messages for $B$ and make $A$ decrypt her own challenges.
0db764174afb updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 155
diff changeset
    30
276
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    31
\item What is the main problem with the following
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    32
authentication protocol where $A$ sends $B$ mutually
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    33
shared key?
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    34
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    35
\begin{center}
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    36
$A \to B: K_{AB}$
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    37
\end{center}
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    38
349
9f4f626cefea updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 314
diff changeset
    39
\item Nonces are unpredicatble random numbers used in protocols.
276
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    40
Consider the following protocol
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    41
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    42
\begin{center}
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    43
\begin{tabular}{ll}
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    44
$A \to B$: & $N$\\  
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    45
$B \to A$: & $\{N + 1\}_{K_{ab}}$\\
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    46
\end{tabular}
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    47
\end{center}
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    48
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    49
Write down three facts that $A$ can infer after this protocol has been
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    50
successfully completed?
239
0db764174afb updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 155
diff changeset
    51
284
71136e7964cc updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 276
diff changeset
    52
\item (\textbf{Deleted}: same as 2) Before starting a TCP connection, client and servers
252
fa151c0a3cf4 updated slides
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 239
diff changeset
    53
perform a three-way handshake:
97
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
    54
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
    55
\begin{center}
252
fa151c0a3cf4 updated slides
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 239
diff changeset
    56
\begin{tabular}{rl}
fa151c0a3cf4 updated slides
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 239
diff changeset
    57
$A \rightarrow S$: & SYN\\
fa151c0a3cf4 updated slides
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 239
diff changeset
    58
$S \rightarrow A$: & SYN-ACK\\
fa151c0a3cf4 updated slides
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 239
diff changeset
    59
$A \rightarrow S$: & ACK\\
97
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
    60
\end{tabular}
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
    61
\end{center}
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
    62
252
fa151c0a3cf4 updated slides
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 239
diff changeset
    63
How can this protocol be abused causing trouble on the server?
97
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
    64
276
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    65
\item Write down a protocol which establishes a secret key
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    66
between $A$ and $B$ using a mutually trusted third party $S$.
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    67
You can assume $A$ and $S$, respectfully $B$ and $S$, share 
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    68
secret keys.
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    69
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    70
\item Consider the following protocol between a car and a
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    71
key transponder: 
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    72
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    73
\begin{enumerate}
314
e01f55e7485a updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 292
diff changeset
    74
\item $C$ generates a random number $N$
e01f55e7485a updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 292
diff changeset
    75
\item $C$ calculates $(F,G) = \{N\}_K$
e01f55e7485a updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 292
diff changeset
    76
\item $C \to T$: $N, F$
e01f55e7485a updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 292
diff changeset
    77
\item $T$ calculates $(F',G') = \{N\}_K$
276
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    78
\item $T$ checks that $F = F'$
314
e01f55e7485a updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 292
diff changeset
    79
\item $T \to C$: $N, G'$
276
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    80
\item $C$ checks that $G = G'$
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    81
\end{enumerate}
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    82
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    83
In Step 2 and 4 a message is split into two halves. Explain
292
d2f20e16a45c updated hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 284
diff changeset
    84
what the purpose of this split is?  Assume the key $K$ is shared 
d2f20e16a45c updated hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 284
diff changeset
    85
only between the car and the transponder.  Does the protocol 
d2f20e16a45c updated hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 284
diff changeset
    86
achieve that the transponder $T$ authenticates itself to the car
d2f20e16a45c updated hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 284
diff changeset
    87
$C$? Does the car authenticate itself to the transponder?
276
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    88
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    89
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    90
97
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
    91
\end{enumerate}
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
    92
\end{document}
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
    93
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
    94
%%% Local Variables: 
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
    95
%%% mode: latex
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
    96
%%% TeX-master: t
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
    97
%%% End: