next up previous
Next: Preventing simple replay attacks Up: Adding the Pruning Algorithm Previous: Adding the Pruning Algorithm

Impersonation attempt

We use two intruders to attack each protocol. The intruder II tries to impersonate the initiator A, and the other intruder IR attempts to impersonate the responder B. Both intruders have the public keys of all the principals in their initial information. If symmetric encryption is used, the intruders certainly do not obtain any of the secret keys. Then, II tries to start a session with B impersonating as A. If II can get B to finish his session believing it is talking to A, then the protocol is simply broken. Similarly we can check whether IR can impersonate as B to finish a session with A. The purpose for this attack is simply to check whether correct and necessary encryptions are used. It does not involve any replay attack and multiple protocol run and hence is very efficient.


next up previous
Next: Preventing simple replay attacks Up: Adding the Pruning Algorithm Previous: Adding the Pruning Algorithm

Adrian Perrig
Fri Sep 1 21:14:38 PDT 2000