Consider the SSL protocol in Figure 10.4. This protocol does not allow Bob to remain anonymous, since his certificate identifies him.
a. Modify the SSL session protocol so that Bob can remain anonymous with respect to a passive attacker.
b. Can you solve part a without increasing the number of messages?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here