From 5597311f679b23b645c9b5509c2194d6c6d5e3e8 Mon Sep 17 00:00:00 2001 From: Andre Henriques Date: Mon, 11 Dec 2023 21:13:32 +0000 Subject: [PATCH] Typed initial answer to 1.3 --- secondcw/ag01598_6644818_1_3.spdl | 2 -- secondcw/cw/cw.tex | 7 +++++++ 2 files changed, 7 insertions(+), 2 deletions(-) diff --git a/secondcw/ag01598_6644818_1_3.spdl b/secondcw/ag01598_6644818_1_3.spdl index 8d4b4c9..96a9277 100644 --- a/secondcw/ag01598_6644818_1_3.spdl +++ b/secondcw/ag01598_6644818_1_3.spdl @@ -23,8 +23,6 @@ protocol protocolPI(Network, Application, Phone) { var mApp: String; - var temp: Ticket; - recv_1(Application,Phone, {mApp, Application, Phone }SesK); fresh mPhone: String; diff --git a/secondcw/cw/cw.tex b/secondcw/cw/cw.tex index 62b3645..c24b5fb 100644 --- a/secondcw/cw/cw.tex +++ b/secondcw/cw/cw.tex @@ -81,6 +81,13 @@ The protocol as it stands does not guarantee secrecy and agreement. + \subsection*{1.3} + The file ag01598\_6644818\_1\_3.spdl contains the fixed version of $\text{protocol}\Pi$ + + The first change was to require the refresh keys request was to require the application to send a nounce, this nonce is then sent back to application to verify that the key was generated, was requested to the application and not by the attacker. + + The second change was to make the network send the identity of the other party to party that is reciving the message. i.e. Sending the identity of the Phone to the Application encrypted with the key Network,Application. This is done to guarantee that the Party reciving the communication is using a key that was intended for this communication. + \end{document}