In addition to providing a standard for public-key certificate formats, X.509 specifies an authentication protocol. The original version of X.509 contains a security flaw. The essence of the protocol is A-B: AA.FA.IDB) B-A: BB.B.IDA.Al A-B: A (B) where I and I are timestamps, and rg are nonces, and the notation X (Y) indicates that the message Y is transmitted, encrypted, and signed by X. The text of X.509 states that checking timestamps A and tg is optional for three-way authentication. But consider the following example: Suppose A and B have used the preceding protocol on some previous occasion, and that opponent C has intercepted the preceding three messages. In addition, suppose that timestamps are not used and are all set to 0. Finally, suppose C wishes to impersonate A to B. C initially sends the first captured message to B: C-B: A (0.A. IDB) B responds, thinking it is talking to A but is actually talking to C: B-C: B(0.rg. IDATA) C meanwhile causes A to initiate authentication with C by some means. As a result, A sends C the following: A-C: A (0.A. IDC) C responds to A using the same nonce provided to C by B. C-A: C{0.. IDA.Al A responds with A-C: Aral This is exactly what C needs to convince B that it is talking to A, so C now repeats the incoming message back out to B. C-B: Arsl So B will believe it is talking to A, whereas it is actually talking to C. Suggest a simple solution to this problem that does not involve the use of timestamps
In addition to providing a standard for public-key certificate formats, X.509 specifies an authentication protocol. The original version of X.509 contains a security flaw. The essence of the protocol is A-B: AA.FA.IDB) B-A: BB.B.IDA.Al A-B: A (B) where I and I are timestamps, and rg are nonces, and the notation X (Y) indicates that the message Y is transmitted, encrypted, and signed by X. The text of X.509 states that checking timestamps A and tg is optional for three-way authentication. But consider the following example: Suppose A and B have used the preceding protocol on some previous occasion, and that opponent C has intercepted the preceding three messages. In addition, suppose that timestamps are not used and are all set to 0. Finally, suppose C wishes to impersonate A to B. C initially sends the first captured message to B: C-B: A (0.A. IDB) B responds, thinking it is talking to A but is actually talking to C: B-C: B(0.rg. IDATA) C meanwhile causes A to initiate authentication with C by some means. As a result, A sends C the following: A-C: A (0.A. IDC) C responds to A using the same nonce provided to C by B. C-A: C{0.. IDA.Al A responds with A-C: Aral This is exactly what C needs to convince B that it is talking to A, so C now repeats the incoming message back out to B. C-B: Arsl So B will believe it is talking to A, whereas it is actually talking to C. Suggest a simple solution to this problem that does not involve the use of timestamps
Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
Related questions
Question
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by step
Solved in 2 steps with 2 images
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education