4.6 Consider a one-way authentication technique based on asymmetric encryption:
A-B: IDA
BA: R₁
AB: E(PR, R₁)
a. Explain the protocol.
b. What type of attack is this protocol susceptible to?
Fig: 1