Scheme 1:
- A -> Establish Connection -> B
- A -> Send Challenge (X) -> B
- A <- Send Response Encrypted(X) <- B
- A validates encryption
- A <- Send Challenge (Y) <- B
- A -> Send Response Encrypted(Y) -> B
- B validates encryption
- Authenticated!
- A -> Establish Connection -> B
- A <- Send Challenge (X) -<- B
- A -> Send Response Encrypted(X) -> B
- B validates encryption
- A -> Send Challenge (Y) -> B
- A <- Send Response Encrypted(Y) <-B
- A validates encryption
- Authenticated!
Can either or both be exploited? How? Are there multiple vulnerabilities?
No comments:
Post a Comment