3 Key Exchange [20 pts]
Tatebayashi, Matsuzaki, and Newman (TMN) proposed the following protocol, which enables Alice and Bob to establish a shared symmetric key K with the help of a trusted server S. Both Alice and Bob know the server’s public key KS. Alice randomly generates a temporary secret KA, while Bob randomly generates the new key K to be shared with Alice. The protocol then proceeds as follows: Alice ⇒ Server: KS{KA}
Bob ⇒ Server: KS{K}
Server ⇒ Alice: K ⊕ KA
Alice recovers key K as KA ⊕ (K ⊕ KA)
To summarize, Alice sends her secret to the server encrypted with the server’s public key, while Bob sends the newly generated key, also encrypted with the server’s public key. The server XORs the two values together and sends the result to Alice. As a result, both Alice and Bob know K. Suppose that evil Charlie eavesdropped on Bob’s message to the server. How can he with the help of his equally evil buddy Don, extract the key K that Alice and Bob are using to protect their communications? Assume that Charlie and Don can engage in the TMN protocol with the server, but they do not know the server’s private key.
It is known that evil Charlie has eavesdropped on Bob's message to the server.
It is also known that he has an evil buddy Don. They both can use TMN protocol with the server.
They can extract the private key for the sever as follows:
1. Charlie will eavesdrop Bob's message to the server.
2. Then he can replay Bob's message which has the shared secret.
3. Then he can engage with Don in the TMN protocol with the server.
4. This will reveal the private key K to both of them.
Get Answers For Free
Most questions answered within 1 hours.