Wide Mouthed Frog Protocol
The protocol specification in "Alice-Bob" notation is as follows:
- A -> S : A,E(Kas:B,Kab)
- S -> B : E(Kbs:A,Kab)
- A -> B : A,E(Kab:M)
For this protocol we considered the following executions:
- A regular execution of the protocol (denoted by attack-state(0)).
- An execution in which the intruder finds out the Session key generated by the server (denoted by attack-state(1)).
After the analysis of this protocol in Maude-NPA, the tool found an initial state corresponding to attack-state(0), which shows an attack in which the intruder impersonates Alice and the server and, thus, the protocol is insecure. The specification of this attack in "Alice-Bob" notation is as follows:
- Z(A) -> Z(S) : A,E(Kas:B,Kab)
- Z(S) -> B : E(Kbs:A,Kab)
- Z(A) -> B : A,E(Kab:M)
After the analysis of this protocol in Maude-NPA, the tool also found an initial state corresponding to attack-state(1), which shows that the protocol has an attack and, therefore, it is insecure. The specification of this attack in "Alice-Bob" notation is as follows:
- Z(A) -> Z(S) : A,E(Kas:B,Kab)
- Z(S) -> B : E(Kbs:A,Kab)
- Z(A) -> B : A,E(Kab:M')
To download the complete protocol specification in Maude-NPA syntax and outputs, click HERE