You have two colleagues who wish to communicate securely. For this purpose you wish to offer authentication to support your e-mail communication.
Select one from among all authentication protocols presented in Chapter 8 or design a protocol that could provide this service.