Description
You will describe an authentication protocol between Alice (the entity identifying and authenticating itself) and Bob (the verifier). The protocol is required to be cryptographic and can be based on a combination of symmetric and asymmetric cryptography. Assume that Alice and Bob do not share a pre-shared symmetric key.
You can assume that either Alice or Bob has a public key certificate that is verifiable by the other party. Describe each step of the protocol, what actions Alice and Bob must accomplish, and the messages Alice and Bob need to send to each other.
Please refer the attached assignment document for the detailed instructions. Please respect the maximum page limit of one page. It is a short assignment.
Learning outcomes being met through this assessment
Steps to complete the assignment