Sarad Venugopalan Home Page

Welcome to data.at.preempted.net
Monday, August 21 2017 @ 09:31 PM UTC

Attacking the Interlock Protocol

ArticlesAbstract The Interlock Protocol is used as a mechanism to foil the Man in the Middle Attack, however by the attack proposed below, it is shown that the Interlock Protocol is insecure. It involves faking the first packet of the communication and the man in the middle sending forth half of the (n) th packet when he receives half of the (n+1) th packet and completes the attack.

Read PDF

Story Options

Attacking the Interlock Protocol | 0 comments | Create New Account
The following comments are owned by whomever posted them. This site is not responsible for what they say.