SlideShare a Scribd company logo
Created by S.Gagan Kumar
https://www.linkedin.com/in/sgagankumar/
Analysis of a
Simple Protocol
Created by S.Gagan Kumar
https://www.linkedin.com/in/sgagankumar/
IN THIS TOPIC
▪ We will look at a simple application when cryptographic protocols can be used.
▪ We study the application and provide insights at the protocol design.
▪ Propose 7 different ways to establish security.
▪ Point out the advantages and disadvantages.
▪ Analyze complexities in protocol design.
Created by S.Gagan Kumar
https://www.linkedin.com/in/sgagankumar/
SIMPLE APPLICATION
NETWORK
ALICE BOB
Hey, its Bob, are you OK?
Hey Bob, its Alice, I’m OK.
OBJECTIVE : maintain security to assure Alice’s liveness
Created by S.Gagan Kumar
https://www.linkedin.com/in/sgagankumar/
PROTOCOL GOALS
Data Origin Authentication of Alice’s Reply
▪ Alice may not be alive but reply is sent by an attacker
Freshness of Alice’s Reply
▪ A previous reply can be resent by the attacker
Assurance that Alice’s reply corresponds to Bob’s request
▪ Bob receives a reply that corresponds to only his Alive requests
Created by S.Gagan Kumar
https://www.linkedin.com/in/sgagankumar/
PROTOCOL 1
ASSUMPTION :
▪ Bob has access to randomness to generate nonce RB.
▪ Alice and Bob share a symmetric key K
▪ Alice and Bob agree to use a strong MAC algorithm
Created by S.Gagan Kumar
https://www.linkedin.com/in/sgagankumar/
PROTOCOL 1
ALICE BOB
RB || It’s Bob, are you OK?
RB || Bob || Yes, I’m OK
MACk (RB || Bob || Yes, I’m OK )
Created by S.Gagan Kumar
https://www.linkedin.com/in/sgagankumar/
PROTOCOL 1
ANALYSIS :
▪ DATA ORIGIN AUTHENTICATION : Only Bob and Alice know the
MAC algorithm hence message is authenticated.
▪ FRESHNESS OF ALICE’s REPLY : The reply contains Nonce RB
which bob generates uniquely every time.
▪ ASSURANCE THAT ALICE’s REPLY CORRESPONDS : The reply
has Nonce RB corresponding to the request made and identifier
Bob is used.
Created by S.Gagan Kumar
https://www.linkedin.com/in/sgagankumar/
PROTOCOL 1
DISADVANTAGES :
▪ The shared key K must not be known to any third person.
▪ Bob must always check for the authentication of the message again
in order to maintain guarantee of origin.
▪ All the action must be performed in the same order to maintain
precision.
Created by S.Gagan Kumar
https://www.linkedin.com/in/sgagankumar/
PROTOCOL 2
ASSUMPTION :
▪ Bob has access to randomness to generate nonce RB.
▪ Alice must have the ability to generate a digital signature. Hence no
pre-shared key is required.
▪ Alice and Bob agree on use of a strong digital signature scheme.
Created by S.Gagan Kumar
https://www.linkedin.com/in/sgagankumar/
PROTOCOL 2
ALICE BOB
RB || It’s Bob, are you OK?
RB || Bob || Yes, I’m OK
SIGa (RB || Bob || Yes, I’m OK )
Created by S.Gagan Kumar
https://www.linkedin.com/in/sgagankumar/
PROTOCOL 2
ANALYSIS :
▪ DATA ORIGIN AUTHENTICATION : Alice is the only entity who can
digitally sign the reply. Bob has to verify for the authentication.
▪ FRESHNESS OF ALICE’s REPLY : The reply contains Nonce RB
which bob generates uniquely every time.
▪ ASSURANCE THAT ALICE’s REPLY CORRESPONDS : The reply
has Nonce RB corresponding to the request made and identifier
Bob is used.
Created by S.Gagan Kumar
https://www.linkedin.com/in/sgagankumar/
PROTOCOL 2
DISADVANTAGES :
▪ Digital Signature requires more computational power. In case of
resource constrained environment MAC’s are more efficient.
▪ Both Alice and Bob have to invest resources on signing and verify
for the authenticity.
Created by S.Gagan Kumar
https://www.linkedin.com/in/sgagankumar/
PROTOCOL 3
ASSUMPTION :
▪ Bob has access to randomness to generate nonce RB.
▪ Alice must have the ability to generate a digital signature. Hence no
pre-shared key is required.
▪ Alice and Bob agree on use of a strong digital signature scheme.
Created by S.Gagan Kumar
https://www.linkedin.com/in/sgagankumar/
PROTOCOL 3
ALICE BOB
RB || It’s Bob, are you OK?
RB || Yes, I’m OK
MACk (RB || Yes, I’m OK )
Created by S.Gagan Kumar
https://www.linkedin.com/in/sgagankumar/
REFLECTION ATTACK
ALICE BOB
RB || It’s Bob, are you OK?
RB || Yes, I’m OK
MACk (RB || Yes, I’m OK )
ATTACKER
RB || It’s Alice, are you OK?
RB || Yes, I’m OK
MACk (RB || Yes, I’m OK )
Created by S.Gagan Kumar
https://www.linkedin.com/in/sgagankumar/
PROTOCOL 3
ANALYSIS :
▪ DATA ORIGIN AUTHENTICATION : Only Bob and Alice know the
MAC algorithm hence message is authenticated.
▪ FRESHNESS OF ALICE’s REPLY : The reply contains Nonce RB
which bob generates uniquely every time.
▪ ASSURANCE THAT ALICE’s REPLY CORRESPONDS : The reply
has Nonce RB corresponding to the request made.
Created by S.Gagan Kumar
https://www.linkedin.com/in/sgagankumar/
PROTOCOL 3
DISADVANTAGES :
▪ Susceptible to Reflection Attacks
▪ Need for an attack detection mechanism, such as session tracking.
THANK YOU !

More Related Content

Recently uploaded

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
Marius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
Expeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
Pixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
marketingartwork
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
Skeleton Technologies
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
SpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
Christy Abraham Joy
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
Vit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
MindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Analysis of a simple cryptographic protocol

  • 1. Created by S.Gagan Kumar https://www.linkedin.com/in/sgagankumar/ Analysis of a Simple Protocol
  • 2. Created by S.Gagan Kumar https://www.linkedin.com/in/sgagankumar/ IN THIS TOPIC ▪ We will look at a simple application when cryptographic protocols can be used. ▪ We study the application and provide insights at the protocol design. ▪ Propose 7 different ways to establish security. ▪ Point out the advantages and disadvantages. ▪ Analyze complexities in protocol design.
  • 3. Created by S.Gagan Kumar https://www.linkedin.com/in/sgagankumar/ SIMPLE APPLICATION NETWORK ALICE BOB Hey, its Bob, are you OK? Hey Bob, its Alice, I’m OK. OBJECTIVE : maintain security to assure Alice’s liveness
  • 4. Created by S.Gagan Kumar https://www.linkedin.com/in/sgagankumar/ PROTOCOL GOALS Data Origin Authentication of Alice’s Reply ▪ Alice may not be alive but reply is sent by an attacker Freshness of Alice’s Reply ▪ A previous reply can be resent by the attacker Assurance that Alice’s reply corresponds to Bob’s request ▪ Bob receives a reply that corresponds to only his Alive requests
  • 5. Created by S.Gagan Kumar https://www.linkedin.com/in/sgagankumar/ PROTOCOL 1 ASSUMPTION : ▪ Bob has access to randomness to generate nonce RB. ▪ Alice and Bob share a symmetric key K ▪ Alice and Bob agree to use a strong MAC algorithm
  • 6. Created by S.Gagan Kumar https://www.linkedin.com/in/sgagankumar/ PROTOCOL 1 ALICE BOB RB || It’s Bob, are you OK? RB || Bob || Yes, I’m OK MACk (RB || Bob || Yes, I’m OK )
  • 7. Created by S.Gagan Kumar https://www.linkedin.com/in/sgagankumar/ PROTOCOL 1 ANALYSIS : ▪ DATA ORIGIN AUTHENTICATION : Only Bob and Alice know the MAC algorithm hence message is authenticated. ▪ FRESHNESS OF ALICE’s REPLY : The reply contains Nonce RB which bob generates uniquely every time. ▪ ASSURANCE THAT ALICE’s REPLY CORRESPONDS : The reply has Nonce RB corresponding to the request made and identifier Bob is used.
  • 8. Created by S.Gagan Kumar https://www.linkedin.com/in/sgagankumar/ PROTOCOL 1 DISADVANTAGES : ▪ The shared key K must not be known to any third person. ▪ Bob must always check for the authentication of the message again in order to maintain guarantee of origin. ▪ All the action must be performed in the same order to maintain precision.
  • 9. Created by S.Gagan Kumar https://www.linkedin.com/in/sgagankumar/ PROTOCOL 2 ASSUMPTION : ▪ Bob has access to randomness to generate nonce RB. ▪ Alice must have the ability to generate a digital signature. Hence no pre-shared key is required. ▪ Alice and Bob agree on use of a strong digital signature scheme.
  • 10. Created by S.Gagan Kumar https://www.linkedin.com/in/sgagankumar/ PROTOCOL 2 ALICE BOB RB || It’s Bob, are you OK? RB || Bob || Yes, I’m OK SIGa (RB || Bob || Yes, I’m OK )
  • 11. Created by S.Gagan Kumar https://www.linkedin.com/in/sgagankumar/ PROTOCOL 2 ANALYSIS : ▪ DATA ORIGIN AUTHENTICATION : Alice is the only entity who can digitally sign the reply. Bob has to verify for the authentication. ▪ FRESHNESS OF ALICE’s REPLY : The reply contains Nonce RB which bob generates uniquely every time. ▪ ASSURANCE THAT ALICE’s REPLY CORRESPONDS : The reply has Nonce RB corresponding to the request made and identifier Bob is used.
  • 12. Created by S.Gagan Kumar https://www.linkedin.com/in/sgagankumar/ PROTOCOL 2 DISADVANTAGES : ▪ Digital Signature requires more computational power. In case of resource constrained environment MAC’s are more efficient. ▪ Both Alice and Bob have to invest resources on signing and verify for the authenticity.
  • 13. Created by S.Gagan Kumar https://www.linkedin.com/in/sgagankumar/ PROTOCOL 3 ASSUMPTION : ▪ Bob has access to randomness to generate nonce RB. ▪ Alice must have the ability to generate a digital signature. Hence no pre-shared key is required. ▪ Alice and Bob agree on use of a strong digital signature scheme.
  • 14. Created by S.Gagan Kumar https://www.linkedin.com/in/sgagankumar/ PROTOCOL 3 ALICE BOB RB || It’s Bob, are you OK? RB || Yes, I’m OK MACk (RB || Yes, I’m OK )
  • 15. Created by S.Gagan Kumar https://www.linkedin.com/in/sgagankumar/ REFLECTION ATTACK ALICE BOB RB || It’s Bob, are you OK? RB || Yes, I’m OK MACk (RB || Yes, I’m OK ) ATTACKER RB || It’s Alice, are you OK? RB || Yes, I’m OK MACk (RB || Yes, I’m OK )
  • 16. Created by S.Gagan Kumar https://www.linkedin.com/in/sgagankumar/ PROTOCOL 3 ANALYSIS : ▪ DATA ORIGIN AUTHENTICATION : Only Bob and Alice know the MAC algorithm hence message is authenticated. ▪ FRESHNESS OF ALICE’s REPLY : The reply contains Nonce RB which bob generates uniquely every time. ▪ ASSURANCE THAT ALICE’s REPLY CORRESPONDS : The reply has Nonce RB corresponding to the request made.
  • 17. Created by S.Gagan Kumar https://www.linkedin.com/in/sgagankumar/ PROTOCOL 3 DISADVANTAGES : ▪ Susceptible to Reflection Attacks ▪ Need for an attack detection mechanism, such as session tracking.

Editor's Notes

  1. Both use a common network which is used by many other people. Bob wants to check is Alice is Alive. Bob sends a request message to check for Alice status and Alice has to reply back to Bob to ensure her liveness This happens periodically at any choosen time.
  2. Both use a common network which is used by many other people. Bob wants to check is Alice is Alive. Bob sends a request message to check for Alice status and Alice has to reply back to Bob to ensure her liveness This happens periodically at any choosen time. Transfer: We note that first 2 goals provide the basic guarantee that alice is alive. Third goal is to provode more precision.
  3. Data origin authentication : only bob and alice know the MAC algorithm hence message is authenticated
  4. Data origin authentication : only bob and alice know the MAC algorithm hence message is authenticated
  5. Data origin authentication : only bob and alice know the MAC algorithm hence message is authenticated
  6. Data origin authentication : only bob and alice know the MAC algorithm hence message is authenticated
  7. Data origin authentication : only bob and alice know the MAC algorithm hence message is authenticated
  8. Data origin authentication : only bob and alice know the MAC algorithm hence message is authenticated