Woo and Lam Authenticacion Protocols
The protocol specification in "Alice-Bob" notation is as follows.
- A -> B : A
- B -> A : Nb
- A -> B : E(Kas:Nb)
- B -> S : E(Kbs:A,E(Kas:Nb))
- S -> B : E(Kbs:Nb)
For this protocol we considered the following execution:
- A regular execution of the protocol (denoted by attack-state(0)).
After the analysis of this protocol in Maude-NPA, the tool found an initial state corresponding to attack-state(0). This initial state shows an authentication attack in which Bob completed his protocol execution believing he was communicating with Alice, but he was actually communicating with the intruder. Therefore, the protocol is insecure. The specification of this attack in "Alice-Bob" notation is as follows:
- Z(A) -> B : A
- S -> Z(A) : B
- Z(A) -> B : E(Kas:Nb)
- B -> S : Nb
- B -> Z(S) : E(Kbs:A,E(Kas:Nb))
- S -> B : E(Kbs:Nb)
To download the complete protocol specification in Maude-NPA syntax click HERE