Amended Needham Schroeder
The protocol specification in "Alice-Bob" notation is as follows.
- A -> B : A
- B -> A : E(Kbs:A,Nb0)
- A -> S : A,B,Na,E(Kbs:A,Nb0)
- S -> A : E(Kas:Na,B,Kab,E(Kbs:Kab,Nb0,A))
- A -> B : E(Kbs:Kab,Nb0,A)
- B -> A : E(Kab:Nb)
- A -> B : E(Kab:Nb-1)
For this protocol we considereded the following executions:
- A regular execution of the protocol (denoted by attack-state(0)).
After the analysis of this protocol in Maude-NPA, the tool found an initial state corresponding to attack-state(0), which shows
an attack in which the intruder impersonates the server and, thus, the
protocol is insecure.
The specification of this attack in "Alice-Bob" notation is as follows:
- A -> B : A
- B -> A : E(Kbs:A,Nb0)
- A -> Z(S) : A,B,Na,E(Kbs:A,Nb0)
- Z(S) -> A : E(Kas:Na,B,Kab,E(Kbs:Kab,Nb0,A))
- A -> B : E(Kbs:Kab,Nb0,A)
- B -> A : E(Kab:Nb)
- A -> B : E(Kab:Nb-1)