Unit 3
Unit 3
Cryptographic Protocols
• Arbitrated Protocols
• In a computer protocol arbiter is a trustworthy third party who
ensures fairness. The arbiter might be a person , a program, or a
machine. For example, in a network an arbiter might be a
program running on one machine of the network. The program
receives and forwards messages between users. The user trust
that when the arbiter forwards a message saying it comes from
A, the message really did come from user A.the notion of an
arbiter is the basis for type of secure protocol called an
arbitrated protocol.
Arbitrated Protocols disadvantages
• The two sides may not be able to find a neutral third party that
both sides trust. Suspicious users are rightfully suspicious of
unknown arbiter in a network.
• Maintaining the availability of an arbiter represents a cost to the
users or the network ; that cost may be high.
• Arbitration causes a time delay in communication because a third
party must receive, act on, and then forward every transaction.
• If the arbitration service is heavily used, it may become a bottleneck
in the network as many users try to access a single arbiter.
• Secrecy becomes weak, because the arbiter has access to much
sensitive information.
• Adjudicated Protocols
Its able to see all sides third party to judge fairness based on
evidences.
Not only can a third party determine whether two parties
acted fairly, that is, within the rules of the protocol, but
third party can also determine who cheated.
Adjudicated protocols involve the services of a third party
only in case of a dispute. Therefore, they are usually less
costly, in terms of machine time or access to a trusted third
party software judge, than arbitrated protocols. However,
adjudicated protocols detect a failure to cooperate only
after the failure has occurred
Hash Function Requirements
A hash function H must have the following properties:
• H can be applied to a block of data of any size
• H produces a fixed-length output
• H(x) is relatively easy to compute for any given x,
making both hardware and software implementations
practical
• For any given code h, it is computationally infeasible
to find x such that h(x)=h
• For any given block x, it is computationally infeasible
to find yx with h(y)=h(x)
• It is computationally infeasible to find any pair (x, y)
such that h(x)=h(y)
Message Authentication Using a One-
Message
Way Hash Function
Message
Message
H
Compare
K
H
K
D
E
Message
Message
H
Compare
Kpublic
H
Kprivate
D