Attacking the Interlock Protocol

Wednesday, February 23 2011 @ 02:05 PM UTC

Contributed by: Sarad

Abstract The Interlock Protocol is used as a mechanism to foil the Man in the Middle Attack, however by the attack proposed below, it is shown that the Interlock Protocol is insecure. It involves faking the first packet of the communication and the man in the middle sending forth half of the (n) th packet when he receives half of the (n+1) th packet and completes the attack.

Read PDF

Comments (0)