Write a small project which implements authentication using Needham-Schroeder protocol. Alice connects to Bob using a trusted third party.
It consists of 3 parts:
1) Server(Bob) - provides some secret calculation - Demands authentication - Authenticates to a client
2) Client(Alice) - Has to connect to a server - Authenticates - Has to be sure, that she connects to Bob - Gets the calculation result - Ends the connection
3) Third Party - Trent (KDC) - Knows Alice and Bob, can connect to each of them directly and safely (symmetric key encryption)