Suppose Alice and Bob decide to use the following "three-pass protocol" to setupa shared secret session key K. First, Alice chooses a random K. Alice alsogenerates a random secret one-time pad key KA and XORs it with K. She sends M1= KA K to Bob. Bob generates a random secret one-time pad key KB, XORs what he receives with it to compute M2 = M1 KB,