Skip to main content

Questions tagged [protocols]

A description and set of rules for the ordered exchange of structured information designed with the goal of protecting the security of the system.

9 votes
3 answers
3k views

I've got multiple OTP managers on my telephone. All of them seem to work with a constant timeout on the one-time passwords that are generated. For instance, the Microsoft authenticator works using a 6-...
Maarten Bodewes's user avatar
3 votes
2 answers
558 views

In the Needham–Schroeder public-key protocol we have the identities A and B of Alice and Bob, respectively. The initial version of the protocol was vulnerable to a MitM attack where the fix consists ...
Daniel C's user avatar
  • 709
1 vote
0 answers
45 views

I'm a student and during one of my classes I came up with an idea about sharing data online. I'll say right away that I'm not an expert, but rather an amateur who wants to share my thoughts and get ...
Lesha's user avatar
  • 11
1 vote
0 answers
372 views

I have an assignment in which I have to implement OCSP and do a proof of concept of a vulnerability. My idea was to implement OCSP without using a nonce (this is done) and then perform a replay attack....
Pedro's user avatar
  • 11
1 vote
2 answers
645 views

If the key exchange happens when using lets say Wireguard or any other protocols that use IKA, and the connection never drops, could the ISP still detect the VPN traffic using Deep Packet Inspection?
Emily1001's user avatar
3 votes
2 answers
607 views

I'm trying to find evidence of use of the associated data (authenticated cleartext associated with the encrypted and authenticated data) feature offered by AEAD (Authenticated Encryption with ...
Bruno Rohée's user avatar
  • 5,552
1 vote
1 answer
195 views

Consider the diagram in https://en.wikipedia.org/wiki/Kerberos_(protocol)#/media/File:Kerberos_protocol.svg depicting the Kerberos protocol. I'm wondering how the authentication server (AS) is useful.....
user2224350's user avatar
9 votes
9 answers
5k views

I am new to the info-sec industry and was recently tasked with evaluating the communication protocols used by my various subsystems. So it was stated in the requirements that the systems have to ...
Lucas's user avatar
  • 99

15 30 50 per page
1
2 3 4 5
22