What:
Another key-exchange protocol developed in 1978.
Given:
- Alice (initiator)
- Bob (receiver)
- : Alice’s public key
- : Bob’s public key
- Message is encrypted with
Protocol Steps:
- Alice sends Bob an encrypted message (containing a secret unique number) with his public key:
- Bob responds back to the message, with his own secret unique number. He encrypts the message with Alice’s public key:
- (In the safer NSL version he also sends )
- He sends Alice’s number to confirm he got it
- Alice responds with to confirm she’s received the message.
- After all this, they can confirm they’re both talking with each-other securely.
Problem:
- It’s susceptible to a Man-In-The-Middle attacker. Imagine inserting yourself in between Alice and Bob. Since there’s no authentication, you could have a secure chat between both of them, but simply act as proxy. Boom!