<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=Otway%E2%80%93Rees_protocol</id>
	<title>Otway–Rees protocol - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=Otway%E2%80%93Rees_protocol"/>
	<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=Otway%E2%80%93Rees_protocol&amp;action=history"/>
	<updated>2026-05-15T09:46:15Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.32.0</generator>
	<entry>
		<id>http://en.zaoniao.it/index.php?title=Otway%E2%80%93Rees_protocol&amp;diff=2470&amp;oldid=prev</id>
		<title>Admin: Created page with &quot;'''Otway–Rees protocol''' is a computer network authentication protocol designed for use on insecure networks (e.g. the Internet)...&quot;</title>
		<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=Otway%E2%80%93Rees_protocol&amp;diff=2470&amp;oldid=prev"/>
		<updated>2019-03-23T07:37:42Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;Otway–Rees protocol&amp;#039;&amp;#039;&amp;#039; is a &lt;a href=&quot;/index.php?title=Computer_network&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Computer network (page does not exist)&quot;&gt;computer network&lt;/a&gt; &lt;a href=&quot;/Authentication&quot; title=&quot;Authentication&quot;&gt;authentication&lt;/a&gt; &lt;a href=&quot;/index.php?title=Communications_protocol&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Communications protocol (page does not exist)&quot;&gt;protocol&lt;/a&gt; designed for use on &lt;a href=&quot;/index.php?title=Insecure_network&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Insecure network (page does not exist)&quot;&gt;insecure networks&lt;/a&gt; (e.g. the &lt;a href=&quot;/index.php?title=Internet&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Internet (page does not exist)&quot;&gt;Internet&lt;/a&gt;)...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;'''Otway–Rees protocol''' is a [[computer network]] [[authentication]] [[communications protocol|protocol]] designed for use on [[insecure network]]s (e.g. the [[Internet]]). It allows individuals communicating over such a network to prove their identity to each other while also preventing [[eavesdropping]] or [[replay attack]]s and allowing for the detection of modification.&lt;br /&gt;
&lt;br /&gt;
The protocol can be specified as follows in [[security protocol notation]], where '''A'''lice is authenticating herself to '''B'''ob using a server '''S''' ('''M''' is a session-identifier, '''N&amp;lt;sub&amp;gt;A&amp;lt;/sub&amp;gt;''' and '''N&amp;lt;sub&amp;gt;B&amp;lt;/sub&amp;gt;''' are [[Cryptographic nonce|nonce]]s):&lt;br /&gt;
&lt;br /&gt;
# &amp;lt;math&amp;gt;A \rightarrow B: M,A,B,\{N_A,M,A,B\}_{K_{AS}}&amp;lt;/math&amp;gt;&lt;br /&gt;
# &amp;lt;math&amp;gt;B \rightarrow S: M,A,B,\{N_A,M,A,B\}_{K_{AS}},\{N_B, M,A,B\}_{K_{BS}}&amp;lt;/math&amp;gt;&lt;br /&gt;
# &amp;lt;math&amp;gt;S \rightarrow B: M,\{N_A,K_{AB}\}_{K_{AS}},\{N_B,K_{AB}\}_{K_{BS}}&amp;lt;/math&amp;gt;&lt;br /&gt;
# &amp;lt;math&amp;gt;B \rightarrow A: M,\{N_A,K_{AB}\}_{K_{AS}}&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Note: The above steps do not authenticate '''B''' to '''A'''.&lt;br /&gt;
&lt;br /&gt;
== Attacks on the protocol ==&lt;br /&gt;
There are a variety of attacks on this protocol currently published.&lt;br /&gt;
&lt;br /&gt;
One problem with this protocol is that a malicious intruder can arrange for '''A''' and '''B''' to end up with different keys. Here is how: after '''A''' and '''B''' execute the first three messages, '''B''' has received the key &amp;lt;math&amp;gt;K_{AB}&amp;lt;/math&amp;gt;. The intruder then intercepts the fourth message. He resends message 2, which results in '''S''' generating a new key &amp;lt;math&amp;gt;K'_{AB}&amp;lt;/math&amp;gt;, subsequently sent to '''B'''. The intruder intercepts this message too, but sends to '''A '''the part of it that '''B''' would have sent to '''A'''. So now '''A''' has finally received the expected fourth message, but with &amp;lt;math&amp;gt;K'_{AB}&amp;lt;/math&amp;gt; instead of &amp;lt;math&amp;gt;K_{AB}&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Another problem is that although the server tells '''B''' that '''A''' used a nonce, '''B''' doesn't know if this was a replay of an old message. Specifically, an intruder could discover an older nonce. The older nonce could be reused to authenticate against '''B'''.&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [[Kerberos (protocol)]]&lt;br /&gt;
* [[Needham–Schroeder protocol]]&lt;br /&gt;
&lt;br /&gt;
==Source==&lt;br /&gt;
[http://wikipedia.org/ http://wikipedia.org/]&lt;br /&gt;
&lt;br /&gt;
[[Category:Cryptography]]&lt;br /&gt;
[[Category:Protocol]]&lt;/div&gt;</summary>
		<author><name>Admin</name></author>
		
	</entry>
</feed>