[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: IKEv2 and SIGMA



Hugo, you have talked about the importance of carefully choosing the inputs
to the authentication hash. I envision a situation where:

Responder chooses Nr = SIG_r(Ni, g^xi, IDr, ...)
Initiator creates AUTHi = SIG_i(Ni, g^xy, Nr, ...)

So now the initiator has been tricked into signing something which binds a
derivative of the responder's identity to the nonce and DH values from the
exchange. And the result is that the initiator can no longer repudiate the
exchange.

Is this the kind of attack you are talking about?

Andrew
-------------------------------------------
There are no rules, only regulations. Luckily,
history has shown that with time, hard work,
and lots of love, anyone can be a technocrat.




Follow-Ups: