Process Flow: Using The Blackberry Router Protocol To Open An Authenticated Connection; Blackberry Enterprise Solution - Blackberry ENTERPRISE SOLUTION SECURITY - ENTERPRISE SOLUTION - SECURITY TECHNICAL Overview

Table of Contents

Advertisement

BlackBerry Enterprise Solution

Impersonating a BlackBerry Enterprise Server
An impersonation of the BlackBerry Enterprise Server occurs when the attacker sends messages to the
BlackBerry device so that the BlackBerry device believes it is communicating with the BlackBerry Enterprise
Server. The attacker must send s to the BlackBerry device, which requires effectively solving the discrete log
problem to determine s or the hash of s.

Process flow: Using the BlackBerry Router protocol to open an authenticated connection

1.
The BlackBerry device and the BlackBerry Enterprise Server both hash the current BlackBerry device master
encryption key using SHA-512.
2.
The BlackBerry device picks a random value r
3. The BlackBerry device sends R
Server.
4. The BlackBerry Router observes the data that the BlackBerry device sends and confirms that the value R
not the point at infinity. If R
5. The BlackBerry Router forwards R
6. The BlackBerry Enterprise Server calculates that as R
7.
The BlackBerry Enterprise Server picks a random value r
If R
equals R
, the BlackBerry Enterprise Server calculates another value of R
D
B
8. The BlackBerry Enterprise Server picks a random value e
9. The BlackBerry Enterprise Server sends R
10. The BlackBerry Router observes the data that the BlackBerry Enterprise Server sends and confirms the
following calculations:
checks that when the value R
checks that when the value e
11. The BlackBerry Router forwards R
12. The BlackBerry device performs the following calculations:
checks that when the value R
checks that when the value e
computes y
= h – e
D
13. The BlackBerry device picks a random value e
14. The BlackBerry device sends y
15. The BlackBerry Router observes the data that the BlackBerry device sends and confirms that if e
e
equals e
, the value e
B
D
16. The BlackBerry Router forwards y
17. The BlackBerry Enterprise Server performs the following calculations:
checks that when the value e
checks that when the value e
computes y
= h – e
B
18. The BlackBerry Enterprise Server sends y
19. The BlackBerry device receives y
If the BlackBerry device accepts y
authenticated connection between them.
©
2009 Research In Motion Limited. All rights reserved.
where 1 < r
D,
and KeyID, a master encryption key identifier, to the BlackBerry Enterprise
D
is the point at infinity, the BlackBerry Router sets R
D
and KeyID to the BlackBerry Enterprise Server.
D
, e
, and KeyID to the BlackBerry device.
B
D
approaches the point at infinity or R
B
equals 0, the value e
D
, e
, and KeyID to the BlackBerry device.
B
D
approaches the point at infinity or R
B
equals 0, the value e
D
r
mod p
D
D
, where 1 < e
B
and e
to the BlackBerry Enterprise Server.
D
B
is random.
B
and e
to the BlackBerry Enterprise Server.
D
B
equals e
, the value e
D
B
equals 0, the value e
D
r
(mod p)
B
B
to the BlackBerry device.
B
.
B
, the BlackBerry Enterprise Server and the BlackBerry device open an
B
< p – 1 and calculates R
D
approaches the point at infinity, R
D
, where 1 < r
< p – 1 and calculates R
B
B
.
B
, where 1 < e
< p – 1.
D
D
equals R
D
is random
D
equals R
D
is random
D
< p – 1.
B
is random
B
is random
D
www.blackberry.com
81
= r
P.
D
D
is
D
to a random value.
D
is random.
D
= r
P.
B
B
, the value R
is random
B
B
, the value R
is random
B
B
equals 0 or
B

Advertisement

Table of Contents
loading

This manual is also suitable for:

Enterprise server 4.1

Table of Contents