Carlsen's Secret Key Initiator Protocol
The protocol specification in "Alice-Bob" notation is as follows.
- A -> B : A,Na
- B -> S : A,Na,B,Nb
- S -> B : E(Kbs:Kab,Nb,A),E(Kas:Na,B,Kab)
- B -> A : E(Kas:Na,B,Kab),E(Kab:Na),Nb'
- A -> B : E(Kab:Nb')
For this protocol we will consider the following three executions:
- A regular execution of the protocol (denoted by attack-state(0)).
- An execution in which the intruder finds out the Session key generated by the server (denoted by attack-state(1)).
- An execution where Bob completed his protocol execution believing he was communicating with Alice, but it actually was not so (denoted attack-state (2)).
After the analysis of this protocol in Maude-NPA, the tool found an initial state corresponding to attack-state(0), which shows a completed regular execution of the protocol.
When analyzing attack-state(1) the tool did not find any initial state and, thus, the protocol is secure against an attack to obtain the session key.
After the analysis of the attack-state(2) Maude-NPA did not find any inital state and, thus the protocol is secure against an authentication attack.
To download the complete protocol specification in Maude-NPA syntax and outputs, click HERE