Basic principles of identification protocols – Entity Authentication
5.1.1 Basic principles of identification protocols The simple exchange of a question and an answer between Alice and Bob described previously can be seen as a rudimentary identification protocol. We touched on this subject in Section 2.5, Authentication in Chapter 2, Secure Channel and the CIA Triad, and will now provide some more details. But…