next up previous
Next: Adding the Pruning Algorithm Up: Case Study: Automatic Generation Previous: Case Study: Automatic Generation

Assumptions

We initially analyzed how many first messages the initiator A can send, with a given depth of the message tree. Subsequently, we refer to the two protocol principals as the initiator A and the responder B. Initially the initiator knows the following atomic message components: A, B, KA, KA-1, KB, NA. With a message depth of 4 the initiator can generate about one thousand messages; and with a depth of 6, it can generate about 8 million messages. If a two-party mutual authentication protocol uses three rounds, considering 1000 possible messages in each round would leave us with 109 protocols. A protocol screener which analyzes 20 protocols per second, would take over 1 year.

After the initial estimate, we decide to make certain assumptions to keep the protocol space small. We do not intend to prove that these assumptions do not eliminate the potential optimal protocol. But we believe these assumptions are intuitively reasonable. We list all the assumptions we make in the case study as the following:

The last point reduces the protocol space tremendously. Unfortunately, this optimization might result in missing a correct protocol. This case can occur if the generated protocol is vulnerable to a specific replay attack, where a message of round i can be replayed for another message of round j (i ≠ j). In our current implementation of APG, the protocol is rejected and no permutation of the message components is considered. In the future, however, we could detect this case and try to repair the protocol through a message reordering.


next up previous
Next: Adding the Pruning Algorithm Up: Case Study: Automatic Generation Previous: Case Study: Automatic Generation

Adrian Perrig
Fri Sep 1 21:14:38 PDT 2000