The following mutual authentication protocol is based on a shared symmetric key KAB-
Show that Trudy can attack the protocol to convince Bob that she is Alice, where, as usual, we assume that the cryptography is secure. Modify the protocol to prevent such an attack by Trudy.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here