22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

142 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Figure 5. The authentication protocol for the stateful service. Both the request <strong>and</strong> response are<br />

signed with the sender’s private key as a part of authentication process. A timestamp, a nonce<br />

<strong>and</strong> the server’s name is included for replay protection<br />

Figure 6. The authentication protocol for the stateless service. Requests are not reply protected since<br />

this is not considered as a threat, but the response need to be protected for reasons of response replay<br />

<strong>and</strong> information compromise. For the sake of integrity protection, the request is signed. The encryption<br />

of the response is a part of the authentication scheme, not a privacy measure

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!