null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
54035
Crypto U8 (part 2), Freshness
Description
IYM002 (Unit 8 - randomness, freshness, AKE) Mind Map on Crypto U8 (part 2), Freshness, created by jjanesko on 23/04/2013.
No tags specified
iym002
unit 8 - randomness
freshness
ake
iym002
unit 8 - randomness, freshness, ake
Mind Map by
jjanesko
, updated more than 1 year ago
More
Less
Created by
jjanesko
over 11 years ago
80
10
0
Resource summary
Crypto U8 (part 2), Freshness
freshness mechanism
techniques used to provide assurance that a message is new
i.e. a message is not a replay of an old message
not assurance of "aliveness" of sender because message could be delayed
3 kinds
sequence number
sender looks up a sequence number (counter) from a database & sends with message
receiver looks up sequence number in DB and compares with sent sequence number
challenges
sender and receiver must have databases
DBs must be synchronized
communication delays matter only if messages get mixed up
need a way to ensure integrity of sequence #
often a MAC is used to ensure that the sequence # has not been altered
clock based
message sent with a time stamp
receiver checks to see if time is within "window of acceptability"
challenges
sender and receiver must have clocks
clocks must be synchronized
problem with "clock drift"
need clock resync method
not useful for scenarios with big communication delays
needs a way to ensure the integrity of timestamp
often a MAC is used to ensure the timestamp has not been altered
nonce based
nonce = "number used only once"
sender creates nonce and sends to receiver with message
receiver sends response along with originally sent nonce
challenges
freshness requires 2 communication passes
does not required synchronization of clocks or DBs
sender must have access to a random number generator
does not provide message authentication
attacker may have guessed the nonce (unlikely)
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Crypto U8, example dynamic password scheme
jjanesko
Crypto U8 (part 3), entity authentication
jjanesko
Crypto U8 (part 1), Randomness
jjanesko
Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
jjanesko
Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
jjanesko
Crypto U1, Basic Principles
jjanesko
Crypto U3, Theoretical vs. Practical Security
jjanesko
Crypto U4, Stream Cipher
jjanesko
Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
jjanesko
Crypto U4, Block Cipher, Counter Mode
jjanesko
Crypto U2, Crypto design principles
jjanesko
Browse Library