hws/hw05.tex
changeset 276 d7109c6e721d
parent 252 fa151c0a3cf4
child 284 71136e7964cc
equal deleted inserted replaced
275:06a04b3b2dda 276:d7109c6e721d
     1 \documentclass{article}
     1 \documentclass{article}
     2 \usepackage{charter}
     2 \usepackage{../style}
     3 \usepackage{hyperref}
       
     4 \usepackage{amssymb}
       
     5 
     3 
     6 \begin{document}
     4 \begin{document}
     7 
     5 
     8 \section*{Homework 5}
     6 \section*{Homework 5}
     9 
     7 
    10 \begin{enumerate}
     8 \begin{enumerate}
       
     9 \item What can attacker that controls the network do to a communication
       
    10 between a client and a server?
       
    11 
       
    12 \item Before starting a TCP connection, client and servers
       
    13 perform a three-way handshake. Describe how can this three-way
       
    14 handshake can be abused by an attacker? 
       
    15 
    11 \item Consider the following simple mutual authentication protocol:
    16 \item Consider the following simple mutual authentication protocol:
    12 
    17 
    13 \begin{center}
    18 \begin{center}
    14 \begin{tabular}{ll}
    19 \begin{tabular}{ll}
    15 $A \rightarrow B$: & $N_a$\\  
    20 $A \to B$: & $N_a$\\  
    16 $B \rightarrow A$: & $\{N_a, N_b\}_{K_{ab}}$\\
    21 $B \to A$: & $\{N_a, N_b\}_{K_{ab}}$\\
    17 $A \rightarrow B$: & $N_b$\\
    22 $A \to B$: & $N_b$\\
    18 \end{tabular}
    23 \end{tabular}
    19 \end{center}
    24 \end{center}
    20 
    25 
    21 Explain how an attacker $B'$ can launch an impersonation attack by 
    26 Explain how an attacker $B'$ can launch an impersonation attack by 
    22 intercepting all messages for $B$ and make $A$ decrypt her own challenges.
    27 intercepting all messages for $B$ and make $A$ decrypt her own challenges.
    23 
    28 
       
    29 \item What is the main problem with the following
       
    30 authentication protocol where $A$ sends $B$ mutually
       
    31 shared key?
       
    32 
       
    33 \begin{center}
       
    34 $A \to B: K_{AB}$
       
    35 \end{center}
       
    36 
       
    37 \item Nonces are unpredicatble random numbers used in protocols? 
       
    38 Consider the following protocol
       
    39 
       
    40 \begin{center}
       
    41 \begin{tabular}{ll}
       
    42 $A \to B$: & $N$\\  
       
    43 $B \to A$: & $\{N + 1\}_{K_{ab}}$\\
       
    44 \end{tabular}
       
    45 \end{center}
       
    46 
       
    47 Write down three facts that $A$ can infer after this protocol has been
       
    48 successfully completed?
    24 
    49 
    25 \item Before starting a TCP connection, client and servers
    50 \item Before starting a TCP connection, client and servers
    26 perform a three-way handshake:
    51 perform a three-way handshake:
    27 
    52 
    28 \begin{center}
    53 \begin{center}
    33 \end{tabular}
    58 \end{tabular}
    34 \end{center}
    59 \end{center}
    35 
    60 
    36 How can this protocol be abused causing trouble on the server?
    61 How can this protocol be abused causing trouble on the server?
    37 
    62 
       
    63 \item Write down a protocol which establishes a secret key
       
    64 between $A$ and $B$ using a mutually trusted third party $S$.
       
    65 You can assume $A$ and $S$, respectfully $B$ and $S$, share 
       
    66 secret keys.
       
    67 
       
    68 \item Consider the following protocol between a car and a
       
    69 key transponder: 
       
    70 
       
    71 \begin{enumerate}
       
    72 \item $C$ generates a random number $r$
       
    73 \item $C$ calculates $(F,G) = \{r\}_K$
       
    74 \item $C \to T$: $r, F$
       
    75 \item $T$ calculates $(F',G') = \{r\}_K$
       
    76 \item $T$ checks that $F = F'$
       
    77 \item $T \to C$: $r, G'$
       
    78 \item $C$ checks that $G = G'$
       
    79 \end{enumerate}
       
    80 
       
    81 In Step 2 and 4 a message is split into two halves. Explain
       
    82 what the purpose of this split is? 
       
    83 
       
    84 
       
    85 
    38 \end{enumerate}
    86 \end{enumerate}
    39 \end{document}
    87 \end{document}
    40 
    88 
    41 %%% Local Variables: 
    89 %%% Local Variables: 
    42 %%% mode: latex
    90 %%% mode: latex