Question: Consider the following mutual authentication protocol, where KAB is a shared symmetric key. ? Give two different attacks that Trudy can use to convince Bob that she is Alice.(add diagram in your answer)
Information related to above question is enclosed below:
Attachment:- Capture.rar