Question

3 Key Exchange [20 pts] Tatebayashi, Matsuzaki, and Newman (TMN) proposed the following protocol, which enables...

3 Key Exchange [20 pts]

Tatebayashi, Matsuzaki, and Newman (TMN) proposed the following protocol, which enables Alice and Bob to establish a shared symmetric key K with the help of a trusted server S. Both Alice and Bob know the server’s public key KS. Alice randomly generates a temporary secret KA, while Bob randomly generates the new key K to be shared with Alice. The protocol then proceeds as follows: Alice ⇒ Server: KS{KA}

Bob ⇒ Server: KS{K}

Server ⇒ Alice: K ⊕ KA

Alice recovers key K as KA ⊕ (K ⊕ KA)

To summarize, Alice sends her secret to the server encrypted with the server’s public key, while Bob sends the newly generated key, also encrypted with the server’s public key. The server XORs the two values together and sends the result to Alice. As a result, both Alice and Bob know K. Suppose that evil Charlie eavesdropped on Bob’s message to the server. How can he with the help of his equally evil buddy Don, extract the key K that Alice and Bob are using to protect their communications? Assume that Charlie and Don can engage in the TMN protocol with the server, but they do not know the server’s private key.

Homework Answers

Answer #1

It is known that evil Charlie has eavesdropped on Bob's message to the server.

It is also known that he has an evil buddy Don. They both can use TMN protocol with the server.

They can extract the private key for the sever as follows:

1. Charlie will eavesdrop Bob's message to the server.

2. Then he can replay Bob's message which has the shared secret.

3. Then he can engage with Don in the TMN protocol with the server.

4. This will reveal the private key K to both of them.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions