Security Protocols I - Information Security
Security Protocols I - Information Security
Security Protocols I - Information Security
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Sebastian Mödersheim 42What went wrong?• Problem in step 2.B → A : {NA, NB} pk(A)Agent B should also give his name: {NA, NB, B} pk(A) .• Known as Lowe’s Fix.• Is the improved version now correct?FMSEC Module 2, v.2 28.09.2009