1Ağu
In practice, what are the identities in the Needham–Schroeder protocol?
In the Needham–Schroeder public-key protocol we have the identities A
and B
of Alice and Bob, respectively. The initial version of the protocol was vulnerable to a MitM attack where the fix consists of adding Bob's identity to message 6.
Let's say someone wants to write an implementation of the protocol. I was trying to picture how this would look, as a mental exercise, and I'm having difficulties with the identities.
Q: For practical purposes, what are the identities A
and B
of Alice and Bob?
Would this be a fixed string or maybe the location of the parties, for example, String alice = "A"
or String alice = "192.168.1.10:50100"
?