This article includes a list of references, related reading, or external links, but its sources remain unclear because it lacks inline citations. Please help improve this article by introducing more precise citations. (June 2013) (Learn how and when to remove this message)

Yahalom is an authentication and secure key-sharing protocol designed for use on an insecure network such as the Internet. Yahalom uses a trusted arbitrator to distribute a shared key between two people. This protocol can be considered as an improved version of Wide Mouth Frog protocol (with additional protection against man-in-the-middle attack), but less secure than the Needham–Schroeder protocol.

Protocol description

[edit]

If Alice (A) initiates the communication to Bob (B) with S is a server trusted by both parties, the protocol can be specified as follows using security protocol notation:

Alice sends a message to Bob requesting communication.

Bob sends a message to the Server encrypted under .

The Server sends to Alice a message containing the generated session key and a message to be forwarded to Bob.

Alice forwards the message to Bob and verifies has not changed. Bob will verify has not changed when he receives the message.

BAN-Yahalom

[edit]

Burrows􏰂, Abadi􏰂 and Needham proposed a variant of this protocol in their 1989 paper as follows:[1]




In 1994, Paul Syverson demonstrated two attacks on this protocol.[1]

See also

[edit]

References

[edit]
  1. ^ a b Paul Syverson. A taxonomy of replay attacks. In Proceedings of the 7th IEEE Computer Security Foundations Workshop, pages 131􏰀–136. IEEE Computer Society Press, 1994.