HOME

TheInfoList



OR:

The Otway–Rees protocol is a computer network authentication protocol designed for use on
insecure network InSecurity is a Canadian spy comedy television series that aired on CBC Television from 2011 to 2012. The series centres on a team of covert operatives working for the National Intelligence and Security Agency (NISA), a fictional Canadian intelli ...
s (e.g. the Internet). It allows individuals communicating over such a network to prove their identity to each other while also preventing eavesdropping or replay attacks and allowing for the detection of modification. The protocol can be specified as follows in security protocol notation, where Alice is authenticating herself to Bob using a server S (M is a session-identifier, NA and NB are
nonce Nonce may refer to: * Cryptographic nonce, a number or bit string used only once, in security engineering * Nonce word, a word used to meet a need that is not expected to recur * The Nonce, American rap duo * Nonce orders, an architectural term ...
s): # A \rightarrow B: M,A,B,\_ # B \rightarrow S: M,A,B,\_,\_ # S \rightarrow B: M,\_,\_ # B \rightarrow A: M,\_ Note: The above steps do not authenticate B to A. This is one of the protocols analysed by Burrows, Abadi and Needham in the paper that introduced an early version of Burrows–Abadi–Needham logic.


Attacks on the protocol

There are a variety of attacks on this protocol currently published.


Interception attacks

These attacks leave the intruder with the session key and may exclude one of the parties from the conversation. Boyd and Mao observe that the original description does not require that S check the plaintext A and B to be the same as the A and B in the two ciphertexts. This allows an intruder masquerading as B to intercept the first message, then send the second message to S constructing the second ciphertext using its own key and naming itself in the plaintext. The protocol ends with A sharing a session key with the intruder rather than B. Gürgens and Peralta describe another attack which they name an arity attack. In this attack the intruder intercepts the second message and replies to B using the two ciphertexts from message 2 in message 3. In the absence of any check to prevent it, M (or perhaps M,A,B) becomes the session key between A and B and is known to the intruder. Cole describes both the Gürgens and Peralta arity attack and another attack in his book Hackers Beware. In this the intruder intercepts the first message, removes the plaintext A,B and uses that as message 4 omitting messages 2 and 3. This leaves A communicating with the intruder using M (or M,A,B) as the session key.


Disruptive attacks

This attack allows the intruder to disrupt the communication but does not allow the intruder to gain access to it. One problem with this protocol is that a malicious intruder can arrange for A and B to end up with different keys. Here is how: after A and B execute the first three messages, B has received the key K_. The intruder then intercepts the fourth message. He resends message 2, which results in S generating a new key K'_, subsequently sent to B. The intruder intercepts this message too, but sends to A the part of it that B would have sent to A. So now A has finally received the expected fourth message, but with K'_ instead of K_.


See also

*
Kerberos (protocol) Kerberos () is a computer-network authentication protocol that works on the basis of ''tickets'' to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. Its designers aimed it primarily a ...
* Needham–Schroeder protocol * Yahalom (protocol) * Wide Mouth Frog protocol


References

{{DEFAULTSORT:Otway-Rees protocol Computer access control protocols Authentication protocols Key transport protocols Symmetric-key cryptography