Kao-Chow Repeated Authentication Protocol with Handshake Key
The protocol specification in "Alice-Bob" notation is as follows.
- A -> S : A , B , Na
- S -> B : E(Kas:A,B,Na,Kab,Kt) , E(Kbs:A,B,Na,Kab,Kt)
- B -> A : E(Kas:A,B,Na,Kab) , E(Kt:Na,Kab),Nb
- A -> B : E(Kt:Na,Kab)
For this protocol we considered the following execution:
- A regular execution of the protocol (denoted by attack-state(0)).
After the analysis of this protocol in Maude-NPA, the tool found an initial state corresponding to attack-state(0). This initial state shows an attack in which the intruder obtains the session key (Kab) and, therefore, the protocol is insecure. The specification in "Alice-Bob" notation is as follows:
- I -> A : Kis
- A -> I : A , I , Na
- S -> B : E(Kas:A,B,Na,Kab,Kt) , E(Kbs:A,B,Kab,Kt)
- I -> A : E(Kis:A,I,Na,Kai,Kbs)
- I -> A : A , I , Na , Kai , Kbs
- I -> A : I,Nb,Kai,Kbs
- I -> A : Nb , Kai, Kbs
- I -> A : Kai , Kbs
- I -> A : Kbs
- I(A) -> B : E(Kt,Na,Kab)
- I(S) -> B : Kbs [Generated by intruder]
- A -> S : A , B , Na , Kab , Kt
- I(S) -> B : E(Kbs:A,B,Na,Kab,Kt)
- I(S) -> B : E(Kbs:A,B,Na,Kab,Kt) , E(Kbs:A,B,Na,Kab,Kt)
- B -> A : E(Kas:A,B,Na,Kab) , E(Kt:Na,Kab,Nb)
- A -> B : E(Kt:Na,Kab)