annotate papers/trusted/appendixB.tex @ 0:bce86c4163a3

Initial revision
author kono
date Mon, 18 Apr 2005 23:46:02 +0900
parents
children
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
rev   line source
0
bce86c4163a3 Initial revision
kono
parents:
diff changeset
1 % appendix B
bce86c4163a3 Initial revision
kono
parents:
diff changeset
2
bce86c4163a3 Initial revision
kono
parents:
diff changeset
3 \appendix{B}{A Short Exchange}
bce86c4163a3 Initial revision
kono
parents:
diff changeset
4
bce86c4163a3 Initial revision
kono
parents:
diff changeset
5 The simple nature of the interchange between the user and \MH/
bce86c4163a3 Initial revision
kono
parents:
diff changeset
6 in Appendix~A completely hides any interactions between the \TMA/
bce86c4163a3 Initial revision
kono
parents:
diff changeset
7 and the \KDS/.
bce86c4163a3 Initial revision
kono
parents:
diff changeset
8 Let us briefly examine an exchange that might occur
bce86c4163a3 Initial revision
kono
parents:
diff changeset
9 after the destination \TMA/ receives the message shown in Figure~\before.
bce86c4163a3 Initial revision
kono
parents:
diff changeset
10
bce86c4163a3 Initial revision
kono
parents:
diff changeset
11 To begin,
bce86c4163a3 Initial revision
kono
parents:
diff changeset
12 the \TMA/ must ascertain what it knows about the sender of the message,
bce86c4163a3 Initial revision
kono
parents:
diff changeset
13 which claims to have a \KDS/ ID of~17.
bce86c4163a3 Initial revision
kono
parents:
diff changeset
14 That is,
bce86c4163a3 Initial revision
kono
parents:
diff changeset
15 the \TMA/ must first consider what key relationships it has with the sender.
bce86c4163a3 Initial revision
kono
parents:
diff changeset
16 For the sake of argument,
bce86c4163a3 Initial revision
kono
parents:
diff changeset
17 suppose that this purported subscriber is unknown to the \TMA/.
bce86c4163a3 Initial revision
kono
parents:
diff changeset
18 In this case,
bce86c4163a3 Initial revision
kono
parents:
diff changeset
19 the first step it must undertake is to ascertain the validity of this
bce86c4163a3 Initial revision
kono
parents:
diff changeset
20 subscriber.
bce86c4163a3 Initial revision
kono
parents:
diff changeset
21
bce86c4163a3 Initial revision
kono
parents:
diff changeset
22 \tagdiagram{B1-1}{Ascertaining the Sender}{rui}
bce86c4163a3 Initial revision
kono
parents:
diff changeset
23 As shown in Figure~\rui\ on lines~1--7,
bce86c4163a3 Initial revision
kono
parents:
diff changeset
24 the \TMA/ does this by establishing a connection to the \KDS/ and issuing an
bce86c4163a3 Initial revision
kono
parents:
diff changeset
25 {\it request identified user} (RUI) MCL.%
bce86c4163a3 Initial revision
kono
parents:
diff changeset
26 \nfootnote{In point of fact,
bce86c4163a3 Initial revision
kono
parents:
diff changeset
27 the {\it very} first thing that the \TMA/ does after connecting to the \KDS/
bce86c4163a3 Initial revision
kono
parents:
diff changeset
28 is verify that the key relationships between the \KDS/ and the \TMA/ are
bce86c4163a3 Initial revision
kono
parents:
diff changeset
29 valid (have not expired).
bce86c4163a3 Initial revision
kono
parents:
diff changeset
30 If the key relationship between the two has expired,
bce86c4163a3 Initial revision
kono
parents:
diff changeset
31 the \TMA/ issues a {\it request service initialization} RSI MCL to
bce86c4163a3 Initial revision
kono
parents:
diff changeset
32 establish a new key relationship.
bce86c4163a3 Initial revision
kono
parents:
diff changeset
33 This relationship contains a {\it key-encrypting key} (KK)
bce86c4163a3 Initial revision
kono
parents:
diff changeset
34 and an {\it authentication key} (KA).
bce86c4163a3 Initial revision
kono
parents:
diff changeset
35 Once a valid key relationship exists between the \KDS/ and the \TMA/,
bce86c4163a3 Initial revision
kono
parents:
diff changeset
36 transactions concerning other key relationships may take place.}
bce86c4163a3 Initial revision
kono
parents:
diff changeset
37 If the response by the \KDS/ is positive,
bce86c4163a3 Initial revision
kono
parents:
diff changeset
38 the \TMA/ will use the information returned when generating the
bce86c4163a3 Initial revision
kono
parents:
diff changeset
39 \eg{X-KDS-ID:} field for authentication.
bce86c4163a3 Initial revision
kono
parents:
diff changeset
40 The response \CSM/ returned by the \KDS/ includes
bce86c4163a3 Initial revision
kono
parents:
diff changeset
41 an {\it authentication checksum} (the MAC field on line~15)
bce86c4163a3 Initial revision
kono
parents:
diff changeset
42 and a {\it transaction count} (the CTA field on line~12)
bce86c4163a3 Initial revision
kono
parents:
diff changeset
43 to prevent spoofing by a process pretending to be the \KDS/.
bce86c4163a3 Initial revision
kono
parents:
diff changeset
44 The \TMA/ then acknowledges that the response from the server was acceptable
bce86c4163a3 Initial revision
kono
parents:
diff changeset
45 on lines~18--24.
bce86c4163a3 Initial revision
kono
parents:
diff changeset
46
bce86c4163a3 Initial revision
kono
parents:
diff changeset
47 The next step is to ascertain the actual key relationship used to encrypt the
bce86c4163a3 Initial revision
kono
parents:
diff changeset
48 structure $m$, which appears after the identifying string.
bce86c4163a3 Initial revision
kono
parents:
diff changeset
49 The \TMA/ consults the IDK field in $m$,
bce86c4163a3 Initial revision
kono
parents:
diff changeset
50 and if this relationship is unknown to it,
bce86c4163a3 Initial revision
kono
parents:
diff changeset
51 then the \KDS/ is asked to disclose the key relationship.
bce86c4163a3 Initial revision
kono
parents:
diff changeset
52
bce86c4163a3 Initial revision
kono
parents:
diff changeset
53 \tagdiagram{B1-2}{Ascertaining the Key Relationship}{rsi}
bce86c4163a3 Initial revision
kono
parents:
diff changeset
54 As shown in Figure~\rsi\ on lines~1--9,
bce86c4163a3 Initial revision
kono
parents:
diff changeset
55 This is done by issuing a {\it request service initialization} (RSI) MCL
bce86c4163a3 Initial revision
kono
parents:
diff changeset
56 and specifying the particular key relationship of interest.
bce86c4163a3 Initial revision
kono
parents:
diff changeset
57 The \KDS/ consults its database,
bce86c4163a3 Initial revision
kono
parents:
diff changeset
58 and if the exact key relationship between the two indicated \TMA/s can be
bce86c4163a3 Initial revision
kono
parents:
diff changeset
59 ascertained,
bce86c4163a3 Initial revision
kono
parents:
diff changeset
60 it returns this information.
bce86c4163a3 Initial revision
kono
parents:
diff changeset
61 The key relationship
bce86c4163a3 Initial revision
kono
parents:
diff changeset
62 is encrypted using the key relationship between the \KDS/ and the \TMA/,
bce86c4163a3 Initial revision
kono
parents:
diff changeset
63 and the usual count and authentication fields are included.
bce86c4163a3 Initial revision
kono
parents:
diff changeset
64
bce86c4163a3 Initial revision
kono
parents:
diff changeset
65 Once the \TMA/ knows the key relationship used to encrypt the structure $m$,
bce86c4163a3 Initial revision
kono
parents:
diff changeset
66 it can decider the structure and ascertain the KD/IV/KA triple used to
bce86c4163a3 Initial revision
kono
parents:
diff changeset
67 encrypt the body of the message.
bce86c4163a3 Initial revision
kono
parents:
diff changeset
68
bce86c4163a3 Initial revision
kono
parents:
diff changeset
69 % <--- (
bce86c4163a3 Initial revision
kono
parents:
diff changeset
70 % <--- MCL/RSI
bce86c4163a3 Initial revision
kono
parents:
diff changeset
71 % <--- ORG/3
bce86c4163a3 Initial revision
kono
parents:
diff changeset
72 % <--- KDC/TTI
bce86c4163a3 Initial revision
kono
parents:
diff changeset
73 % <--- SVR/*KK.KD
bce86c4163a3 Initial revision
kono
parents:
diff changeset
74 % <--- EDC/dabfdb4c
bce86c4163a3 Initial revision
kono
parents:
diff changeset
75 % <--- )
bce86c4163a3 Initial revision
kono
parents:
diff changeset
76 % ---> (
bce86c4163a3 Initial revision
kono
parents:
diff changeset
77 % ---> MCL/RTR
bce86c4163a3 Initial revision
kono
parents:
diff changeset
78 % ---> ORG/3
bce86c4163a3 Initial revision
kono
parents:
diff changeset
79 % ---> *KK/926b876cafce46cd365382c36a40fa80
bce86c4163a3 Initial revision
kono
parents:
diff changeset
80 % ---> CTA/1
bce86c4163a3 Initial revision
kono
parents:
diff changeset
81 % ---> KD/1eea5394e6ad1b75
bce86c4163a3 Initial revision
kono
parents:
diff changeset
82 % ---> KD/6c95c8d2caa75807
bce86c4163a3 Initial revision
kono
parents:
diff changeset
83 % ---> EDK/850618075827
bce86c4163a3 Initial revision
kono
parents:
diff changeset
84 % ---> KDC/TTI
bce86c4163a3 Initial revision
kono
parents:
diff changeset
85 % ---> MAC/501f71b6
bce86c4163a3 Initial revision
kono
parents:
diff changeset
86 % ---> EDC/5bd7b2d0
bce86c4163a3 Initial revision
kono
parents:
diff changeset
87 % ---> )
bce86c4163a3 Initial revision
kono
parents:
diff changeset
88 % <--- (
bce86c4163a3 Initial revision
kono
parents:
diff changeset
89 % <--- MCL/ACK
bce86c4163a3 Initial revision
kono
parents:
diff changeset
90 % <--- ORG/3
bce86c4163a3 Initial revision
kono
parents:
diff changeset
91 % <--- KDC/TTI
bce86c4163a3 Initial revision
kono
parents:
diff changeset
92 % <--- EDC/db46ce7e
bce86c4163a3 Initial revision
kono
parents:
diff changeset
93 % <--- )