Question
If Alice and Bob know each otherβs public keys, can they set up a symmetric key ?
- Public Key Encryption Notation means public key encryption.
- and can then be used to generate a symmetric key.
Message Guarantees
Goal : Alice and Bob are sure they are talking to each other.
- Whoever could know is the person who decrypted the first message
- Whoever could know is the person who decrypted the second message.
Man-in-the-Middle Attack on Needham-Schroeder

How the Attack Works
- Alice sends to Elvis, BUT Elvis then forwards this to B pretending to be A : .
- Bob responds with , thinking heβs talking to Alice, BUT Elvis forwards this to Alice.
- Alice now sends to Elvis, so Elvis now has Bobβs nonce AND forwards it to B to complete the protocol.
- Now Elvis can impersonate Alice and Bob.