Question: Design a protocol in which Bob chooses whether to require Alice to send a cookie (see 14.5.1 Cookies). As mentioned in 14.6 Endpoint Identifier Hiding,
Design a protocol in which Bob chooses whether to require Alice to send a cookie (see 14.5.1 Cookies).
As mentioned in 14.6 Endpoint Identifier Hiding, it is possible to design a protocol that will hide both identifiers from an active attacker, assuming that Alice (the initiator) already knows Bobs public key. Show such a protocol.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
