|
|
A, S : | principal |
Kas, Kbs, Kab : | symkey |
Ta, Ts : | timestamp |
1. | A | -> | S | : | A, {Ta, B, Kab}Kas |
2. | S | -> | B | : | {Ts, A, Kab}Kbs |
"It is assumed that the encryption is done in such a way that we know the whole message was sent at once. If two separate encrypted sections are included in one message, we treat them as though they arrived in separate messages. A message cannot be understood by a principal who does not know the key (or, in the case of public-key cryptography, by a principal who does not know the inverse of the key); the key cannot be deduced from the encrypted message. Each encrypted message contains sufficient redundancy to allow a principal who decrypts it to verify that he has used the right key. In addition, messages contain sufficient information for a principal to detect (and ignore) his own messages."
"A sends a session key to S, including a timestamp Ta. S checks that the first message is timely, and if it is, it forwards the message to B, together with its own timestamp Ts. B then checks that the timestamp from S is later than any other it has received from S."
i.1. | A | -> | S | : | A, {Ta, B, Kab}Kas |
i.2. | S | -> | B | : | {Ts, A, Kab}Kbs |
ii.1. | I(B) | -> | S | : | B, {Ts, A, Kab}Kbs |
ii.2. | S | -> | A | : | {T's, B, Kab}Kas |
iii.1. | I(A) | -> | S | : | A, {T's, B, Kab}Kas |
iii.2. | S | -> | B | : | {T''s, A, Kab}Kbs |
.... |
i.1. | A | -> | S | : | A, {Ta, B, Kab}Kas |
i.2. | S | -> | B | : | {Ts, A, Kab}Kbs |
ii.2. | S | -> | B | : | {Ts, A, Kab}Kbs |
|
Previous Index Next |
|