The term Needham–Schroeder protocol can refer to one of the two key transport protocols intended for use over an insecure network, both proposed by Roger Needham and Michael Schroeder. These are:
Contents
- The symmetric protocol
- Attacks on the protocol
- Fixing the attack
- The public key protocol
- An attack on the protocol
- Fixing the man in the middle attack
- References
The symmetric protocol
Here, Alice (A) initiates the communication to Bob (B). S is a server trusted by both parties. In the communication:
The protocol can be specified as follows in security protocol notation:
Attacks on the protocol
The protocol is vulnerable to a replay attack (as identified by Denning and Sacco). If an attacker uses an older, compromised value for KAB, he can then replay the message
Fixing the attack
This flaw is fixed in the Kerberos protocol by the inclusion of a timestamp. It can also be fixed with the use of nonces as described below. At the beginning of the protocol:
Alice sends to Bob a request.Bob responds with a nonce encrypted under his key with the Server.Alice sends a message to the server identifying herself and Bob, telling the server she wants to communicate with Bob.Note the inclusion of the nonce.The protocol then continues as described through the final three steps as described in the original protocol above. Note that
The public-key protocol
This assumes the use of a public-key encryption algorithm.
Here, Alice (A) and Bob (B) use a trusted server (S) to distribute public keys on request. These keys are:
The protocol runs as follows:
At the end of the protocol, A and B know each other's identities, and know both NA and NB. These nonces are not known to eavesdroppers.
An attack on the protocol
Unfortunately, this protocol is vulnerable to a man-in-the-middle attack. If an impostor I can persuade A to initiate a session with him, he can relay the messages to B and convince B that he is communicating with A.
Ignoring the traffic to and from S, which is unchanged, the attack runs as follows:
At the end of the attack, B falsely believes that A is communicating with him, and that NA and NB are known only to A and B.
Fixing the man-in-the-middle attack
The attack was first described in a 1995 paper by Gavin Lowe. The paper also describes a fixed version of the scheme, referred to as the Needham–Schroeder–Lowe protocol. The fix involves the modification of message six to include the responder's identity, that is we replace:
with the fixed version: