Kao-Chow Repeated Authentication Protocol with Tickets
The protocol specification in "Alice-Bob" notation is as follows:
- A -> S : A,B,Na
- S -> B : E(Kas:A,B,Na,Kab,Kt) , E(Kbs:A,B,Na,Kab,Kt)
- B -> A : E(Kas:A,B,Na,Kab) , E(Kt:Na,Kab) , Nb , E(Kbs:A,B,Ta,Kab)
- A -> B : E(Kt:Na,Kab),E(Kbs:A,B,Ta,Kab)
For this protocol we considered the following executions:
- A regular execution of the protocol (denoted by attack-state(0)).
- An execution in which the intruder finds out the Session key generated by the server (denoted by attack-state(1)).
- An execution where Bob completed his protocol execution believing he was communicating with Alice, but it actually was not so (denoted attack-state (2)).
After the analysis of this protocol in Maude-NPA, the tool found an initial state corresponding to attack-state(0), which shows an attack in which the intruder impersonates Alice in a communication with the server and, therefore, the protocol is insecure. The specification of this attack in "Alice-Bob" notation is as follows:
- I(A) -> S : A , B , Na
- S -> B : E(Kas:A,B,Na,Kab,Kt) , E(Kbs:A,B,Na,Kab,Kt)
- B -> A : E(Kas:A,B,Na,Kab) , E(Kt:Na,Kab) , Nb , E(Kbs:A,B,Ta,Kab)
- A -> B : E(Kt:Na,Kab) , E(Kbs:A,B,Ta,Kab)
Maude-NPA also found an initial state corresponding to the attack-state(1), which shows that the protocol has an attack and, thus, is insecure. The specification of this attack in "Alice-Bob" notation is as follows:
- I(A) -> S : G , Z , Ng
- S -> I(A) : E(Kgs:G,Z,Ng,Kgz,Kt) , E(Kzs:G,Z,Ng,Kgz,Kt)
- I(S) -> B : E(Kgs:G,Z,Ng,Kgz,Kt), E(Kbs,A,B,Na,Kgz,Kt)
- B -> I(A) : E(Kt:Ng,Kgz) , E(Kbs:A,B,Kt,Kgz) , E(Kt:Ng,Kgz)Nb , E(Kbs:A,B,Kt,Kgz)
- I(A) ->B : E(Kt:Ng,Kgz) , E(Kbs:A,B,Kt:Kgz)
Finally, when analyzing this protocol in Maude-NPA, the tool found also two initial states corresponding to attack-state(2), which proves that this protocol is vulnerable to an authentication attack and, therfore, it is insecure. The specification in "Alice-Bob" notation of the first attack is as follows:
- I(A) -> S : A , B , Na
- S -> B : E(Kas:A,B,Na,Kab,Kt) , E(Kbs:A,B,Na,Kab,Kt)
- B -> A : E(Kas:A,B,Na,Kab) , E(Kt:Na,Kab) , Nb , E(Kbs:A,B,Ta,Kab)
- A -> B : E(Kt:Na,Kab) , E(Kbs:A,B,Ta,Kab)
The specification of the second attack in "Alice-Bob" notation is as follows:
- I(A) -> S : G , Z , Ng
- S -> I(A) : E(Kgs:G,Z,Ng,Kgz,Kt) , E(Kzs:G,Z,Ng,Kgz,Kt)
- I(S) -> B : E(Kgs:G,Z,Ng,Kgz,Kt) , E(Kbs,a,b,Na,Kgz,Kt)
- B -> I(A) : E(Kt:Ng,Kgz) , (Kbs:a,b,Kt,Kgz) , E(Kt:Ng,Kgz) , Nb , E(Kbs:a,b,Kt,Kgz)
- I(A) -> B : E(Kt:Ng,Kgz) , E(Kbs:a,b,Kt:Kgz)
To download the complete protocol specification in Maude-NPA syntax click HERE