Attacking the Interlock Protocol
Wednesday, February 23 2011 @ 02:05 PM UTC
Contributed by: Sarad
Abstract The Interlock Protocol is used as a mechanism to foil the Man in the Middle Attack, however by the attack proposed below, it is shown that the Interlock Protocol is insecure. It involves faking the first packet of the communication and the man in the middle sending forth half of the (n) th packet when he receives half of the (n+1) th packet and completes the attack.