What else do we need for Properties of Cryptographic Protocols
What does Protocol Try 6 do?
Removing the Authentication Server
- add Long-term key – changes once a day
– KA,B,Longterm is cached and trusted by A and B for sometime.
– KA,B,Longterm authenticates Diffie Hellman key exchange
What does Protocol Try 7 do?
Generic AUTH payload and Selection of Algorithms
What does Protocol Try 8 do?
AUTH Payload Rework
– AUTH payloads are different and contain information provided by both principals
– Proposed/ chosen crypto algs are now authenticated
How does a FINAL Authentication and Key establishment looks like? – 4 Goals
What is the general purpose of a X509 certificate
How to prevent Replay Attack
add Nonces - only accept unknown nonce
set Timestamp - have well synchronized clocks, only recently used timestamps must be memorized
Forward Secrecy - what do we want to avoid
Long-term key leaks
If attacker has recorded previous communication, they can decrypt key transport message and data exchanged over secure channel
store now, decrypt later