hws/hw05.tex
author Christian Urban <christian dot urban at kcl dot ac dot uk>
Tue, 05 Jan 2016 01:37:31 +0000
changeset 442 cceb3d2dcba0
parent 414 9a3aa8c39951
child 459 514485146641
permissions -rw-r--r--
updated
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
97
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
     1
\documentclass{article}
276
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
     2
\usepackage{../style}
97
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
     3
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
     4
\begin{document}
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
     5
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
     6
\section*{Homework 5}
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
     7
414
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 349
diff changeset
     8
\HEADER
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 349
diff changeset
     9
97
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
    10
\begin{enumerate}
276
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    11
\item What can attacker that controls the network do to a communication
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    12
between a client and a server?
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    13
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    14
\item Before starting a TCP connection, client and servers
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    15
perform a three-way handshake. Describe how can this three-way
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    16
handshake can be abused by an attacker? 
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    17
239
0db764174afb updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 155
diff changeset
    18
\item Consider the following simple mutual authentication protocol:
0db764174afb updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 155
diff changeset
    19
0db764174afb updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 155
diff changeset
    20
\begin{center}
0db764174afb updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 155
diff changeset
    21
\begin{tabular}{ll}
276
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    22
$A \to B$: & $N_a$\\  
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    23
$B \to A$: & $\{N_a, N_b\}_{K_{ab}}$\\
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    24
$A \to B$: & $N_b$\\
239
0db764174afb updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 155
diff changeset
    25
\end{tabular}
0db764174afb updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 155
diff changeset
    26
\end{center}
0db764174afb updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 155
diff changeset
    27
0db764174afb updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 155
diff changeset
    28
Explain how an attacker $B'$ can launch an impersonation attack by 
0db764174afb updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 155
diff changeset
    29
intercepting all messages for $B$ and make $A$ decrypt her own challenges.
0db764174afb updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 155
diff changeset
    30
276
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    31
\item What is the main problem with the following
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    32
authentication protocol where $A$ sends $B$ mutually
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    33
shared key?
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    34
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    35
\begin{center}
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    36
$A \to B: K_{AB}$
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    37
\end{center}
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    38
349
9f4f626cefea updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 314
diff changeset
    39
\item Nonces are unpredicatble random numbers used in protocols.
276
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    40
Consider the following protocol
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    41
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    42
\begin{center}
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    43
\begin{tabular}{ll}
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    44
$A \to B$: & $N$\\  
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    45
$B \to A$: & $\{N + 1\}_{K_{ab}}$\\
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    46
\end{tabular}
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    47
\end{center}
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    48
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    49
Write down three facts that $A$ can infer after this protocol has been
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    50
successfully completed?
239
0db764174afb updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 155
diff changeset
    51
276
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    52
\item Write down a protocol which establishes a secret key
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    53
between $A$ and $B$ using a mutually trusted third party $S$.
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    54
You can assume $A$ and $S$, respectfully $B$ and $S$, share 
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    55
secret keys.
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    56
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    57
\item Consider the following protocol between a car and a
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    58
key transponder: 
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    59
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    60
\begin{enumerate}
314
e01f55e7485a updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 292
diff changeset
    61
\item $C$ generates a random number $N$
e01f55e7485a updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 292
diff changeset
    62
\item $C$ calculates $(F,G) = \{N\}_K$
e01f55e7485a updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 292
diff changeset
    63
\item $C \to T$: $N, F$
e01f55e7485a updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 292
diff changeset
    64
\item $T$ calculates $(F',G') = \{N\}_K$
276
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    65
\item $T$ checks that $F = F'$
314
e01f55e7485a updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 292
diff changeset
    66
\item $T \to C$: $N, G'$
276
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    67
\item $C$ checks that $G = G'$
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    68
\end{enumerate}
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    69
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    70
In Step 2 and 4 a message is split into two halves. Explain
292
d2f20e16a45c updated hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 284
diff changeset
    71
what the purpose of this split is?  Assume the key $K$ is shared 
d2f20e16a45c updated hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 284
diff changeset
    72
only between the car and the transponder.  Does the protocol 
d2f20e16a45c updated hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 284
diff changeset
    73
achieve that the transponder $T$ authenticates itself to the car
d2f20e16a45c updated hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 284
diff changeset
    74
$C$? Does the car authenticate itself to the transponder?
276
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    75
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    76
d7109c6e721d updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 252
diff changeset
    77
97
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
    78
\end{enumerate}
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
    79
\end{document}
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
    80
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
    81
%%% Local Variables: 
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
    82
%%% mode: latex
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
    83
%%% TeX-master: t
efcac3016613 added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff changeset
    84
%%% End: