[CST-2] Security: 2000 P9 Q6
Andrei Legostaev
al263@cam.ac.uk
Tue, 29 May 2001 21:37:26 +0100
http://www.cl.cam.ac.uk/tripos/y2000p9q6.pdf
Has anybody got interesting ideas on this question?
There seems to be one small problem and one obvious attack on
the original protocol -
Problem: The sender (A) is not stated in plain text, so we don't
know whose public key to use to decrypt the inner message.
Attack: The parties sharing the key are not stated in the inner
message, so B can masquerade as A by forwarding the inner
message to C and so fooling him into using K(AB).
OK, I can see how this can be drawn out into a 6-mark answer...
But then comes the second part, where the change to the protocol
has addressed neither the "problem" nor the attack. What can be
written for 12 marks?
Help!
A