Lecture 5
Lecture 5
16
4. E intercepts the message and learns Ks by
computing D(PRe, E(PUe, Ks)).
5. E transmits E(PUa, Ks) to A.
The result is that both A and B know Ks and
17
Cont..
Knowing Ks, E can decrypt all messages,
and both A and B are unaware of the
problem. Thus, this simple protocol is only
useful in an environment where the only
threat is eavesdropping.
18
Secret Key Distribution with
Confidentiality and Authentication
Secret Key Distribution with Confidentiality
and Authentication
1. A uses B's public key to encrypt a message to B
containing an identifier of A (IA) and a nonce (N1),
which is used to identify this transaction uniquely.
2. B sends a message to A encrypted with PUa and
containing A's nonce (N1) as well as a new nonce
generated by B (N2). Because only B could have
decrypted message (1), the presence of N1 in
message (2) assures A that the correspondent is
B.
3. A returns N2, encrypted using B's public key, to
assure B that its correspondent is A.
20
Cont..
Certificate issued