diff --git a/secondcw/ag01598_6644818_1_3.spdl b/secondcw/ag01598_6644818_1_3.spdl index 8d4b4c9..96a9277 100644 --- a/secondcw/ag01598_6644818_1_3.spdl +++ b/secondcw/ag01598_6644818_1_3.spdl @@ -23,8 +23,6 @@ protocol protocolPI(Network, Application, Phone) { var mApp: String; - var temp: Ticket; - recv_1(Application,Phone, {mApp, Application, Phone }SesK); fresh mPhone: String; diff --git a/secondcw/cw/cw.tex b/secondcw/cw/cw.tex index 62b3645..c24b5fb 100644 --- a/secondcw/cw/cw.tex +++ b/secondcw/cw/cw.tex @@ -81,6 +81,13 @@ The protocol as it stands does not guarantee secrecy and agreement. + \subsection*{1.3} + The file ag01598\_6644818\_1\_3.spdl contains the fixed version of $\text{protocol}\Pi$ + + The first change was to require the refresh keys request was to require the application to send a nounce, this nonce is then sent back to application to verify that the key was generated, was requested to the application and not by the attacker. + + The second change was to make the network send the identity of the other party to party that is reciving the message. i.e. Sending the identity of the Phone to the Application encrypted with the key Network,Application. This is done to guarantee that the Party reciving the communication is using a key that was intended for this communication. + \end{document}