Protocol Steps

Why is this secure ?

  • A and B mutually authenticate each other.
  • The attack where Elvis intercepts and impersonates Bob is no longer possible
  • Mutual Authentication - Alice and Bob both verify each other.
  • Protection Against MITM - Attackers cannot impersonate Bob.

Question

Can they read the message encrypted with key (, ) ?

Ans : Secure against the standard attacker : Intercept, replay, delete, alter.

Question

What about governments ?

Ans : After the protocol runs, government can legally force people to handover their private keys.