Data Protection and Security |
||||||
VII |
Identification and Entity Authentication |
|||||
VII.III |
Authentication Protocols |
|||||
Authenticated Key Exchange: With symmetric-key protocols, for encryption take the session key as (KAB+1){R}. It is not secure to use (KAB){R} as the session key because it is transmitted by Alice as the third message and is seen by other parties.
|
||||||
VII.III.V Q |
[+] Question
[-] Question
We need not only authentication at start but encryption and/or integrity checks in the the rest of the session. Why? (Hint: Remember the connection hijaction attack) |
|||||
|
||||||
|
chapter index | |||||