@@ -15,15 +15,16 @@ could be replayed, appearing to the website as though you had ordered
1515more of the same. Even though it wasn’t the original incarnation of
1616the message, its authentication code would still be valid; after all,
1717the message was created by you, and it wasn’t modified. Clearly, we
18- need a solution that ensures *originality *.
18+ need a solution that ensures *freshness *.
1919
2020In a variation of this attack called a *suppress-replay attack *, an
2121adversary might merely delay your message (by intercepting and later
2222replaying it), so that it is received at a time when it is no longer
2323appropriate. For example, an adversary could delay your order to buy
2424stock from an auspicious time to a time when you would not have wanted
25- to buy. Although this message would in a sense be the original, it
26- wouldn’t be timely. So we also need to ensure *timeliness *. Originality
25+ to buy. Although this message would in a sense be fresh (it hasn't
26+ been sent before), it
27+ wouldn’t be timely. So we also need to ensure *timeliness *. Freshness
2728and timeliness may be considered aspects of integrity. Ensuring them
2829will in most cases require a nontrivial, back-and-forth protocol.
2930
@@ -32,7 +33,7 @@ key. A session key is a secret-key cipher key generated on the fly and
3233used for just one session. This too involves a nontrivial protocol.
3334
3435What these two issues have in common is authentication. If a message is
35- not original and timely, then from a practical standpoint we want to
36+ not fresh and timely, then from a practical standpoint we want to
3637consider it as not being authentic, i.e., not being from whom it claims to be.
3738And, obviously, when you are arranging to share a new session key with
3839someone, you want to know you are sharing it with the right person.
@@ -47,15 +48,15 @@ Diffie-Hellman key exchange in its simplest form does not provide
4748authentication, but in practical usage it is almost always combined
4849with an authentication protocol.
4950
50- There is a core set of techniques used to ensure originality and
51+ There is a core set of techniques used to ensure freshness and
5152timeliness in authentication protocols. We describe those techniques
5253before moving on to particular protocols.
5354
54- 5.1 Originality and Timeliness Techniques
55+ 5.1 Freshness and Timeliness Techniques
5556-------------------------------------------
5657
5758We have seen that authentication codes alone do not enable us to detect
58- messages that are not original or timely. One approach is to include a
59+ messages that are not fresh or timely. One approach is to include a
5960timestamp in the message. Obviously the timestamp itself must be
6061tamperproof, so it must be covered by the message authentication code. The primary
6162drawback to timestamps is that they require distributed clock
0 commit comments