In cryptography, Woo–Lam refers to various computer network authentication protocols designed by Simon S. Lam and Thomas Woo.[1] The protocols enable two communicating parties to authenticate each other's identity and to exchange session keys, and involve the use of a trusted key distribution center (KDC) to negotiate between the parties. Both symmetric-key and public-key variants have been described. However, the protocols suffer from various security flaws, and in part have been described as being inefficient compared to alternative authentication protocols.[2]
The following notation is used to describe the algorithm:
A,B
KUx
x
KRx
x
Nx
x
IDx
x
Ek
k
Sk
k
K
||
It is assumed that all parties know the KDC's public key.
1)A → KDC:IDA||IDB
2)KDC → A:
S | |
KRKDC |
[IDB||KUB]
3)A → B:
E | |
KUB |
[NA||IDA]
4)B → KDC:IDB||IDA||E
KUKDC |
[NA]
5)KDC → B:
S | |
KRKDC |
[IDA||KUA]||E
KUB |
[S | |
KRKDC |
[NA||K||IDB||IDA]]
6)B → A:
E | |
KUA |
[S | |
KRKDC |
[NA||K]||NB]
7)A → B:EK[NB]
The original version of the protocol[3] had the identifier
IDA
NA