[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: how Nonce payload be used to prevent replay attack
"Aronson, David" wrote:
>
> dxh (sleepy-cat@263.net) writes:
>
> > I am not very clear about that. Are there anybody can
> > explain it to me?
> > I will be very appreciative for your help.
>
> The basic idea seems to be, "quote this number I just made up back to me, or
> I won't believe you're really carrying on a session". Someone simply
> replaying old recorded packets won't be able to do that, because the old
> stuff would have a different nonce.
..And such a nonce is easier to verify (in terms of CPU time
and memory state) than an ack payload based on a crypto function.
-Sandeep
>
> --
> Dave Aronson, Software Engineer, +1-571-434-2039 V, +1-571-434-2001 F.
> Cryptek Secure Communications, 1501 Moran Rd., Sterling, VA 20166 USA.
> Opinions above are MINE, ALL MINE -- but for rent at reasonable rates.
References: