• caglararli@hotmail.com
  • 05386281520

In practice, what are the identities in the Needham–Schroeder protocol?

Çağlar Arlı      -    11 Views

In practice, what are the identities in the Needham–Schroeder protocol?

In the Needham–Schroeder public-key protocol we have the identities A and B of Alice and Bob, respectively. The initial version of the protocol was vulnerable to a MitM attack where the fix consists of adding Bob's identity to message 6.

Let's say someone wants to write an implementation of the protocol. I was trying to picture how this would look, as a mental exercise, and I'm having difficulties with the identities.

Q: For practical purposes, what are the identities A and B of Alice and Bob?

Would this be a fixed string or maybe the location of the parties, for example, String alice = "A" or String alice = "192.168.1.10:50100"?