3 \appendix{B
}{A Short Exchange
}
5 The simple nature of the interchange between the user and
\MH/
6 in Appendix~A completely hides any interactions between the
\TMA/
8 Let us briefly examine an exchange that might occur
9 after the destination
\TMA/ receives the message shown in Figure~
\before.
12 the
\TMA/ must ascertain what it knows about the sender of the message,
13 which claims to have a
\KDS/ ID of~
17.
15 the
\TMA/ must first consider what key relationships it has with the sender.
16 For the sake of argument,
17 suppose that this purported subscriber is unknown to the
\TMA/.
19 the first step it must undertake is to ascertain the validity of this
22 \tagdiagram{B1-
1}{Ascertaining the Sender
}{rui
}
23 As shown in Figure~
\rui\ on lines~
1--
7,
24 the
\TMA/ does this by establishing a connection to the
\KDS/ and issuing an
25 {\it request identified user
} (RUI) MCL.
%
26 \nfootnote{In point of fact,
27 the
{\it very
} first thing that the
\TMA/ does after connecting to the
\KDS/
28 is verify that the key relationships between the
\KDS/ and the
\TMA/ are
29 valid (have not expired).
30 If the key relationship between the two has expired,
31 the
\TMA/ issues a
{\it request service initialization
} RSI MCL to
32 establish a new key relationship.
33 This relationship contains a
{\it key-encrypting key
} (KK)
34 and an
{\it authentication key
} (KA).
35 Once a valid key relationship exists between the
\KDS/ and the
\TMA/,
36 transactions concerning other key relationships may take place.
}
37 If the response by the
\KDS/ is positive,
38 the
\TMA/ will use the information returned when generating the
39 \eg{X-KDS-ID:
} field for authentication.
40 The response
\CSM/ returned by the
\KDS/ includes
41 an
{\it authentication checksum
} (the MAC field on line~
15)
42 and a
{\it transaction count
} (the CTA field on line~
12)
43 to prevent spoofing by a process pretending to be the
\KDS/.
44 The
\TMA/ then acknowledges that the response from the server was acceptable
47 The next step is to ascertain the actual key relationship used to encrypt the
48 structure $m$, which appears after the identifying string.
49 The
\TMA/ consults the IDK field in $m$,
50 and if this relationship is unknown to it,
51 then the
\KDS/ is asked to disclose the key relationship.
53 \tagdiagram{B1-
2}{Ascertaining the Key Relationship
}{rsi
}
54 As shown in Figure~
\rsi\ on lines~
1--
9,
55 This is done by issuing a
{\it request service initialization
} (RSI) MCL
56 and specifying the particular key relationship of interest.
57 The
\KDS/ consults its database,
58 and if the exact key relationship between the two indicated
\TMA/s can be
60 it returns this information.
62 is encrypted using the key relationship between the
\KDS/ and the
\TMA/,
63 and the usual count and authentication fields are included.
65 Once the
\TMA/ knows the key relationship used to encrypt the structure $m$,
66 it can decider the structure and ascertain the KD/IV/KA triple used to
67 encrypt the body of the message.
79 % ---> *KK/926b876cafce46cd365382c36a40fa80
81 % ---> KD/1eea5394e6ad1b75
82 % ---> KD/6c95c8d2caa75807
83 % ---> EDK/850618075827