(Translated by https://www.hiragana.jp/)
Needham–Schroeder protocol: Difference between revisions - Wikipedia

Needham–Schroeder protocol: Difference between revisions

Content deleted Content added
More precisely describe the Lowe fix.
Line 83:
 
===An attack on the protocol===
Unfortunately, this protocol is vulnerable to a [[man-in-the-middle attack]]. If an impostor can persuade A to initiate a session with him(how ? this is wrong, tell the mechanism how ?), he can relay the messages to B and convince B that he is communicating with A.
 
Ignoring the traffic to and from S, which is unchanged, the attack runs as follows: