Question: Modify the authentication protocol in Figure 9.12 so that it uses a hash function instead of symmetric key encryption. The resulting protocol must be secure.
Modify the authentication protocol in Figure 9.12 so that it uses a hash function instead of symmetric key encryption. The resulting protocol must be secure.

I'm Alice", RA RB, E("Bob",RA,KAB E("Alice",RB,KAB) Alice Bob
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
