Consider the following protocol (attached file):
a. Explain the protocol in detail.
b. Can you think of a possible attack on this protocol? Explain in detail how it can be done.
c. Mention a possible technique to get around the attack-not a detailed mechanism, just the basics of the idea, but elaborative enough for everyone to follow the process.
Please make sure to appropriately cite your references/sources used.