Consider the following mutual authentication and key establishment protocol, which employs a timestamp T and public key cryptography.
Show that Trudy can attack the protocol to discover the key K where, as usual, we assume that the cryptography is secure. Modify the protocol to prevent such an attack by Trudy.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here