Previous  Index  Next
Send a comment
Security Protocols Open Repository
download: protocol specification in plain text
page in compressed postscript
page in pdf
page source in latex
bibTeX references

Kao Chow Authentication v.2

Author(s): I Long Kao and Randy Chow  (1995)

Summary: Key distribution and authentication protocol. Symmetric keys cryptography with server.

Remark

This protocol is a correction of Kao Chow Authentication v.1 to prevent a freshness attack la Denning Sacco attack (see Needham Schroeder Symmetric Key).

Protocol specification (in common syntax)

A, B, S :   principal
Na, Nb :   number
Kab, Kbs, Kas :   key

1.   A -> S :   A, B, Na
2.   S -> B :   {A, B, Na, Kab, Kt}Kas, {A, B, Na, Kab, Kt}Kbs
3.   B -> A :   B, {A, B, Na, Kab, Kt}Kas, {Na, Kab}Kt, Nb
4.   A -> B :   {Nb, Kab}Kt

Description of the protocol rules

See Kao Chow Authentication v.1. Kt is an additional fresh symmetric key whose purpose is to prevent a freshness attack as in Kao Chow Authentication v.1.

Requirements

See Kao Chow Authentication v.1.

References

[KC95].

This specification of the protocol differs from the one in [CJ97].

Claimed proofs

[KC95]

See also

Kao Chow Authentication v.1, Kao Chow Authentication v.3, Needham Schroeder Symmetric Key, Neumann Stubblebine.

Citations

[CJ97]
John Clark and Jeremy Jacob. A survey of authentication protocol literature : Version 1.0., November 1997.

[KC95]
I Lung Kao and Randy Chow. An efficient and secure authentication protocol using uncertified keys. Operating Systems Review, 29(3):14--21, 1995.
last modified 11/11/2002.
Home
Previous  Index  Next
Send a comment