Protocol Steps
Why is this secure ?
- A and B mutually authenticate each other.
- The attack where Elvis intercepts and impersonates Bob is no longer possible
- Mutual Authentication - Alice and Bob both verify each other.
- Protection Against MITM - Attackers cannot impersonate Bob.
Question
Can they read the message encrypted with key (, ) ?
Ans : Secure against the standard attacker : Intercept, replay, delete, alter.
Question
What about governments ?
Ans : After the protocol runs, government can legally force people to handover their private keys.