1

I am quite unsure about how to approach this question, was wondering if anyone could give me a nudge in the right direction, I would be most appreciative!

So I've learned about the 4-way handshake mutual authentication protocol that's based on a shared secret and given secure private-key encryption scheme, but now I need to know this:

Suppose you are given a secure MAC, Describe a similar mutual authetnication protocol based on a shared secret and then given MAC, explain why it is secure.

0 Answers0