Design a protocol in which Bob chooses whether to require Alice to send a cookie (see 14.5.1
Fantastic news! We've Found the answer you've been seeking!
Question:
Design a protocol in which Bob chooses whether to require Alice to send a cookie (see 14.5.1 Cookies).
As mentioned in 14.6 Endpoint Identifier Hiding, it is possible to design a protocol that will hide both identifiers from an active attacker, assuming that Alice (the initiator) already knows Bobs public key. Show such a protocol.
Posted Date: