Question: The following mutual authentication protocol is based on a shared symmetric key K_AB. Show that Trudy can attack the protocol to convince Bob that she

The following mutual authentication protocol is based on a shared symmetric key K_AB. Show that Trudy can attack the protocol to convince Bob that she is Alice, where, as usual, we assume that the cryptography is secure. Modify the protocol to prevent such an attack by Trudy
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
