author | Christian Urban <urbanc@in.tum.de> |
Sun, 24 Sep 2017 16:48:52 +0100 | |
changeset 526 | dac7bab6cfea |
parent 522 | 280e057558b8 |
permissions | -rw-r--r-- |
97
efcac3016613
added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
1 |
\documentclass{article} |
276
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
2 |
\usepackage{../style} |
97
efcac3016613
added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
3 |
|
efcac3016613
added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
4 |
\begin{document} |
efcac3016613
added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
5 |
|
efcac3016613
added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
6 |
\section*{Homework 5} |
efcac3016613
added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
7 |
|
414
9a3aa8c39951
update
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
349
diff
changeset
|
8 |
\HEADER |
9a3aa8c39951
update
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
349
diff
changeset
|
9 |
|
97
efcac3016613
added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
10 |
\begin{enumerate} |
459
514485146641
updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
442
diff
changeset
|
11 |
\item Imagine you are researching security products |
514485146641
updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
442
diff
changeset
|
12 |
(e.g.~CCTV, alarms etc) on a helpful website. They ask |
514485146641
updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
442
diff
changeset
|
13 |
you for your address details? Think about whether this |
514485146641
updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
442
diff
changeset
|
14 |
can be bad for you. |
514485146641
updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
442
diff
changeset
|
15 |
|
514485146641
updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
442
diff
changeset
|
16 |
|
276
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
17 |
\item What can attacker that controls the network do to a communication |
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
18 |
between a client and a server? |
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
19 |
|
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
20 |
\item Before starting a TCP connection, client and servers |
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
21 |
perform a three-way handshake. Describe how can this three-way |
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
22 |
handshake can be abused by an attacker? |
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
23 |
|
239
0db764174afb
updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
155
diff
changeset
|
24 |
\item Consider the following simple mutual authentication protocol: |
0db764174afb
updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
155
diff
changeset
|
25 |
|
0db764174afb
updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
155
diff
changeset
|
26 |
\begin{center} |
0db764174afb
updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
155
diff
changeset
|
27 |
\begin{tabular}{ll} |
276
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
28 |
$A \to B$: & $N_a$\\ |
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
29 |
$B \to A$: & $\{N_a, N_b\}_{K_{ab}}$\\ |
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
30 |
$A \to B$: & $N_b$\\ |
239
0db764174afb
updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
155
diff
changeset
|
31 |
\end{tabular} |
0db764174afb
updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
155
diff
changeset
|
32 |
\end{center} |
0db764174afb
updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
155
diff
changeset
|
33 |
|
0db764174afb
updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
155
diff
changeset
|
34 |
Explain how an attacker $B'$ can launch an impersonation attack by |
0db764174afb
updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
155
diff
changeset
|
35 |
intercepting all messages for $B$ and make $A$ decrypt her own challenges. |
0db764174afb
updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
155
diff
changeset
|
36 |
|
276
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
37 |
\item What is the main problem with the following |
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
38 |
authentication protocol where $A$ sends $B$ mutually |
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
39 |
shared key? |
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
40 |
|
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
41 |
\begin{center} |
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
42 |
$A \to B: K_{AB}$ |
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
43 |
\end{center} |
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
44 |
|
349
9f4f626cefea
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
314
diff
changeset
|
45 |
\item Nonces are unpredicatble random numbers used in protocols. |
276
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
46 |
Consider the following protocol |
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
47 |
|
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
48 |
\begin{center} |
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
49 |
\begin{tabular}{ll} |
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
50 |
$A \to B$: & $N$\\ |
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
51 |
$B \to A$: & $\{N + 1\}_{K_{ab}}$\\ |
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
52 |
\end{tabular} |
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
53 |
\end{center} |
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
54 |
|
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
55 |
Write down three facts that $A$ can infer after this protocol has been |
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
56 |
successfully completed? |
239
0db764174afb
updated home works
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
155
diff
changeset
|
57 |
|
276
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
58 |
\item Write down a protocol which establishes a secret key |
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
59 |
between $A$ and $B$ using a mutually trusted third party $S$. |
508
c7b690b17b1d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
470
diff
changeset
|
60 |
You can assume $A$ and $S$, respectively $B$ and $S$, share |
276
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
61 |
secret keys. |
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
62 |
|
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
63 |
\item Consider the following protocol between a car and a |
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
64 |
key transponder: |
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
65 |
|
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
66 |
\begin{enumerate} |
314
e01f55e7485a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
292
diff
changeset
|
67 |
\item $C$ generates a random number $N$ |
e01f55e7485a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
292
diff
changeset
|
68 |
\item $C$ calculates $(F,G) = \{N\}_K$ |
e01f55e7485a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
292
diff
changeset
|
69 |
\item $C \to T$: $N, F$ |
e01f55e7485a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
292
diff
changeset
|
70 |
\item $T$ calculates $(F',G') = \{N\}_K$ |
276
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
71 |
\item $T$ checks that $F = F'$ |
314
e01f55e7485a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
292
diff
changeset
|
72 |
\item $T \to C$: $N, G'$ |
276
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
73 |
\item $C$ checks that $G = G'$ |
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
74 |
\end{enumerate} |
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
75 |
|
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
76 |
In Step 2 and 4 a message is split into two halves. Explain |
292
d2f20e16a45c
updated hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
284
diff
changeset
|
77 |
what the purpose of this split is? Assume the key $K$ is shared |
d2f20e16a45c
updated hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
284
diff
changeset
|
78 |
only between the car and the transponder. Does the protocol |
d2f20e16a45c
updated hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
284
diff
changeset
|
79 |
achieve that the transponder $T$ authenticates itself to the car |
d2f20e16a45c
updated hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
284
diff
changeset
|
80 |
$C$? Does the car authenticate itself to the transponder? |
276
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
81 |
|
521 | 82 |
\item What are the main disadvantages of the following |
83 |
protocol that establishes a mutual key between two |
|
84 |
parties $A$ and $B$ with the help of a mutually trusted |
|
85 |
third party $S$: |
|
86 |
||
87 |
\begin{center} |
|
88 |
\begin{tabular}{l@{\hspace{2mm}}l} |
|
89 |
$A \to S :$ & $A, B$\\ |
|
90 |
$S \to A :$ & $\{K_{AB}\}_{K_{AS}}$ and $\{\{K_{AB}\}_{K_{BS}} \}_{K_{AS}}$\\ |
|
91 |
$A \to B :$ & $\{K_{AB}\}_{K_{BS}}$\\ |
|
92 |
$A \to B :$ & $\{m\}_{K_{AB}}$\\ |
|
93 |
\end{tabular} |
|
94 |
\end{center} |
|
95 |
||
522 | 96 |
\item Explain briefly the purpose of the certification authority in |
97 |
the public-private key encryption scheme. |
|
98 |
||
99 |
\item Explain briefly what is meant by a certification authority |
|
100 |
becoming ``too big to fail'' when it has issued a large number |
|
101 |
of certificates. |
|
102 |
||
103 |
\item In which situations does it make sense to install |
|
104 |
invalid (self-signed) certificates? |
|
105 |
||
276
d7109c6e721d
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
252
diff
changeset
|
106 |
|
470
6764a249118a
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
459
diff
changeset
|
107 |
\item \POSTSCRIPT |
97
efcac3016613
added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
108 |
\end{enumerate} |
efcac3016613
added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
109 |
\end{document} |
efcac3016613
added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
110 |
|
efcac3016613
added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
111 |
%%% Local Variables: |
efcac3016613
added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
112 |
%%% mode: latex |
efcac3016613
added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
113 |
%%% TeX-master: t |
efcac3016613
added hws
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
diff
changeset
|
114 |
%%% End: |