Casper files for the Wide Mouthed Frog Protocol
This directory contains Casper input files for the Wide Mouthed Frog
Protocol from [BAN89].
-
First version, with a single initiator Alice and a
single responder Bob; does not finds any attack.
-
Second version, where an agent Alice can act both
as initator and responder; finds a simple attack where a message 1 is replayed
as a message 2.
-
Third version, where the responder can perform
two runs of the protocol; finds an attack where the intruder replays a message
2, to make the responder think that the initiator is trying to establish two
runs.
-
Fourth version, with a single initator and
responder; finds the ping-pong attack, where the intruder carries out an
exchange with the server, so as to update the timestamps in the messages,
while time passes, thus leading to a failure of timed authentication.
References:
[AN95] Ross Anderson and Roger Needham. Programming Satan's Computer. In
J. van Leeuwen (ed.), Computer Science Today, LNCS 1000,
Springer-Verlag, 1995.
[BAN89]
Michael Burrows, Martín Abadi, and Roger Needham.
A logic of authentication.
Proceedings of the Royal Society of London A, 426:233--271,
1989.
Also available as Digital Equipment Corporation
Systems Research Center report No.~39, 1989.