Consider the following mutual authentication and key establishment protocol, which uses a timestamp T and public key cryptography.
For each of the following cases, explain whether or not the resulting protocol provides an effective means for secure mutual authentication and a secure session key K. Ignore replay attacks based solely on the clock skew.
a. Message 1: {[T,Ä"]Alice}Bob
b. Message 1
c. Message 1
d. Message 1
e. Message 1
{"Alice", [T^Alice}Bob
"Alice", {[T,jqAlice}Bob
T, "Alice", {[K]Alice}Bob
"Alice", {[TUiicebob and let K = h{T)
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here