Computer security- attacks on protocols
Classical attacks on security protocols
Note: most follow man in the middle attacks where intruder sniffs information
Out of context attacks
Using messages generated in one context in another
May be using a message generated in protocol 1 for protocol 2
So if using the Needham-Schroeder protocol we know that
A sends b a nonce NA and identity, encrypted with B’s public key
B replies with nonce NB as well as NA, encrypted with A’s public key
A then replies with B’s nonce, encrypted by public key of B
BUT
MiM would receive message from a with pb key of MiM
Would copy A’s message but send to B, encrypted by B’s public key
Receive nonce from B encrypted with A’s public key
Forwards B’s reply to A and receives Nonce of B encrypted MiM public key
Then send to B encrypted by B’s public key
Now has B’s nonce
However this can be prevented with more identification checks
B should include identity in reply
Replay attacks
Replay attacks
Simply replaying protocol message to disrupt session
A may be establishing a session with B but if Intruder copies A’s message
B may think two sessions from A, and intruder has easily got some info
Attacks on multiple layers of encryption
Data at rest
Data on move- can’t always just add encryption to protect
Simple attack- A -> C(pretending to be B): A, Encrypt(M, KpbB), B
Later on C sends this to B and then B would reply with message but encrypted with public key of C
C now has M
All that had to be done to prevent is for A to sign off that it is from A to B and B do the same!
With multiple encryption the message will just be the inner encryption
Comments
Post a Comment