University of Tennessee at Chattanooga

Critical Thinking Question 4: Please explain steps in the following Needham-Schroeder protocol. Why do we need R A ? Why do we need R B ? What is the session key between Alice and Bob? What is the ticket for Bob and why it needs to be encrypted by K B ? Figure 3: Needham- ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download