Questions tagged [protocols]

A description and set of rules for the ordered exchange of structured information designed with the goal of protecting the security of the system.

325 questions
6
votes
1 answer

What is the serious security flaw with this authentication protocol?

I've been asked to solve this security problem, as an exercise, but I have some difficulties. Some notation: C1 means Computer1 S1 means Server1, TA means Trusted Autentication system, X -> Y | Z means X sends message Z to Y, K_X,Y(m) means that m…
Holyclaus
  • 61
  • 3
2
votes
1 answer

What TLS and SSL protocols should I have turned on

I am using Explorer as my browser. What do I have to have on regarding the TLS and SSL protocols. There are several of each one.
Bea
  • 21
  • 1
  • 1
  • 3
2
votes
2 answers

Trouble trying to understand SET protocol

This is the first class I'm having on security and one of the concepts discussed is the SET protocol. I've read about it in many different sources and although I came into many unknown terms, after looking into them one by one I think I now have a…
2
votes
0 answers

Multi Party Protocol - Proof with semi-honest adversaries

I have designed a protocol where one entity acts as a "client", sends information to one of many "server-parties". This second party sends some other information to another "server-party" and so on, until the last "server-party" engages in an…
user188923
  • 21
  • 1
1
vote
2 answers

"Secure" drawing of lots

I want to randomly choose a game in the 50 games I have, in order to play with one of my friend. But this friend doesn't trust me, and neither do I: every time one of us pick up a game, the other complains that the choice was not really random. A…
Sebastien
  • 111
  • 1
1
vote
2 answers

Is there a protocol for securely trading information between possibly uncooperating agents?

Is there a protocol or best practice for trading information between parties where one, after receiving his share of the information from the others, might refuse to answer or might alter his answer, based on the information he just received?…
vsz
  • 717
  • 1
  • 8
  • 19
1
vote
0 answers

Mutual Authentication Protocol based on MAC & shared secret key

I am quite unsure about how to approach this question, was wondering if anyone could give me a nudge in the right direction, I would be most appreciative! So I've learned about the 4-way handshake mutual authentication protocol that's based on a…
1
vote
2 answers

Is there any way to protect a client-side game from a hacked client?

Here's a toy example of a game: the player is presented with N slot machines. They can click on each slot machine once, and when they do so, the slot machine rolls a random outcome (based on a predetermined set of outcomes and probabilities). If the…
user168715
  • 119
  • 2
0
votes
1 answer

How to interpet RFC data format

I'm having slight problems reading the used format in an Internet-Draft: TokenBindingProtocol#Section6 here enum { provided_token_binding(0), referred_token_binding(1), (255) } TokenBindingType; im not sure what the 255 stands for. I assume that…
jannikb
  • 287
  • 3
  • 10
0
votes
1 answer

What does a secure path mean?

I saw it in a slide for Mark Stamp. He says: "Authentication on a stand-alone computer is relatively simple: 1) For example, hash a password with a salt. 2) “Secure path,” attacks on authentication software, keystroke logging, etc., can be…
osmak
  • 103
  • 1
0
votes
1 answer

Is there security in the 1-wire protocol?

I know that the 1-wire protocol has a slower communication and that it can be physically accessible and there other ways to get the information from the data bus. I can't seem to find much information about security in this protocol, for what I…
Luz A
  • 31
  • 6
0
votes
1 answer

Security Protocol Notation Editor

Are there any editors or tools that support the secure protocol notation?
tozevv
  • 109
-1
votes
1 answer

How to restrict my PC to browsing only for security reasons?

I have a PC that i only use for browsing the web. I do not have any problem with disabling any other services/protocols that does not affect web browsing. I want to disable these unnecessary services (For example: Server Message Block). So i need a…
Themobisback
  • 101
  • 2
-8
votes
5 answers

Is SSL more secure than encoding?

I am writing a client / server program pair. I have established my own protocol and am communicating with TCP. Presently, when the client messages the server, it adds 42 to each byte (looping, 127 + 1 = -128) and reverse the byte array to send. The…
Scruffy
  • 123
  • 5