talk: Chaum's Protocol for Detecting Man-in-the-Middle, 12pm Fri 1/30

Chaum’s Protocol for Detecting Man-in-the-Middle: Explanation,
Demonstration, and Timing Studies for a Text-Messaging Scenario

Prof. Alan T. Sherman
UMBC Cyber Defense Lab

12-1pm Friday, 30 January 2015, ITE 228, UMBC

We explain, demonstrate, and evaluate Chaum’s 2006 protocol for detecting a Man-in-the-Middle (MitM) of text-messaging network communications. MitM attacks pose serious risks to many network communications. Networks often mitigate these risks with robust protocols, such as TLS, which assume some type of public-key infrastructure that provides a mechanism for the authenticated exchange of public keys. By contrast, Chaum’s protocol aims to detect a MitM with minimal assumptions and technology, and in particular without assuming the authenticated exchange of public keys.

Joint work with John Seymour and Akshahraj Kore


Posted

in

, , , ,

by

Tags: