Why is the EKE-based Protocol 12-7 insecure? (Hint: someone impersonating Bob can do a dictionary attack, but show how.) How can you make it secure while still having Bob transmit gb mod p unencrypted?
Protocol 12-7. For Homework Problem 14
radia perlman book (network security )