A description and set of rules for the ordered exchange of structured information designed with the goal of protecting the security of the system.
Questions tagged [protocols]
325 questions
6
votes
1 answer
What is the serious security flaw with this authentication protocol?
I've been asked to solve this security problem, as an exercise, but I have some difficulties.
Some notation:
C1 means Computer1
S1 means Server1,
TA means Trusted Autentication system,
X -> Y | Z means X sends message Z to Y,
K_X,Y(m) means that m…
Holyclaus
- 61
- 3
2
votes
1 answer
What TLS and SSL protocols should I have turned on
I am using Explorer as my browser. What do I have to have on regarding the TLS and SSL protocols. There are several of each one.
Bea
- 21
- 1
- 1
- 3
2
votes
2 answers
Trouble trying to understand SET protocol
This is the first class I'm having on security and one of the concepts discussed is the SET protocol. I've read about it in many different sources and although I came into many unknown terms, after looking into them one by one I think I now have a…
John Katsantas
- 121
- 2
2
votes
0 answers
Multi Party Protocol - Proof with semi-honest adversaries
I have designed a protocol where one entity acts as a "client", sends information to one of many "server-parties". This second party sends some other information to another "server-party" and so on, until the last "server-party" engages in an…
user188923
- 21
- 1
1
vote
2 answers
"Secure" drawing of lots
I want to randomly choose a game in the 50 games I have, in order to play with one of my friend. But this friend doesn't trust me, and neither do I: every time one of us pick up a game, the other complains that the choice was not really random.
A…
Sebastien
- 111
- 1
1
vote
2 answers
Is there a protocol for securely trading information between possibly uncooperating agents?
Is there a protocol or best practice for trading information between parties where one, after receiving his share of the information from the others, might refuse to answer or might alter his answer, based on the information he just received?…
vsz
- 717
- 1
- 8
- 19
1
vote
0 answers
Mutual Authentication Protocol based on MAC & shared secret key
I am quite unsure about how to approach this question, was wondering if anyone could give me a nudge in the right direction, I would be most appreciative!
So I've learned about the 4-way handshake mutual authentication protocol that's based on a…
user2268587
- 11
- 1
1
vote
2 answers
Is there any way to protect a client-side game from a hacked client?
Here's a toy example of a game: the player is presented with N slot machines. They can click on each slot machine once, and when they do so, the slot machine rolls a random outcome (based on a predetermined set of outcomes and probabilities).
If the…
user168715
- 119
- 2
0
votes
1 answer
How to interpet RFC data format
I'm having slight problems reading the used format in an Internet-Draft: TokenBindingProtocol#Section6
here
enum {
provided_token_binding(0), referred_token_binding(1), (255)
} TokenBindingType;
im not sure what the 255 stands for. I assume that…
jannikb
- 287
- 3
- 10
0
votes
1 answer
What does a secure path mean?
I saw it in a slide for Mark Stamp. He says:
"Authentication on a stand-alone computer is relatively simple: 1) For
example, hash a password with a salt. 2) “Secure path,” attacks on
authentication software, keystroke logging, etc., can be…
osmak
- 103
- 1
0
votes
1 answer
Is there security in the 1-wire protocol?
I know that the 1-wire protocol has a slower communication and that it can be physically accessible and there other ways to get the information from the data bus.
I can't seem to find much information about security in this protocol, for what I…
Luz A
- 31
- 6
0
votes
1 answer
Security Protocol Notation Editor
Are there any editors or tools that support the
secure protocol notation?
tozevv
- 109
-1
votes
1 answer
How to restrict my PC to browsing only for security reasons?
I have a PC that i only use for browsing the web. I do not have any problem with disabling any other services/protocols that does not affect web browsing.
I want to disable these unnecessary services (For example: Server Message Block).
So i need a…
Themobisback
- 101
- 2
-8
votes
5 answers
Is SSL more secure than encoding?
I am writing a client / server program pair. I have established my own protocol and am communicating with TCP. Presently, when the client messages the server, it adds 42 to each byte (looping, 127 + 1 = -128) and reverse the byte array to send. The…
Scruffy
- 123
- 5