Abstract:
Results of SKID3 protocol security analysis are provided in this paper. An attempt to find a man-in-the-middle attack on this protocol (mentioned by B. Schneier in his book) was made. For this purpose, the author used the Scyther tool created by Cas Cremers and came to the conclusion that SKID3 is rather invulnarable to the man-in-the-middle attack.