Assume that Alice is communicating with Bob with a secret k…
Assume that Alice is communicating with Bob with a secret key (KAlice-Bob) and R is a random number generated by Bob given to Alice. Alice has returned KAlice-Bob{R} (to encrypt R with the key ) to Bob. What is a better way to establish session key when secret key based authentication is used?
Read Details