Question

Part 1: The first part is about: 1. Describing the protocol in standard cryptographic notation, also known as Alice-Bob notation. Information on this notation can be found at https://en.wikipedia.org/wiki/Security_protocol_notation and https://en.wikipedia.org/wiki/Message_sequence_chart.

2. Talk about the weakness or vulnerabilities of the protocol if any. If exists, how to improve the security posture of that protocol. *** Protocol description and analysis (for Part 1): Protocol description: required to provide a graphical description of the protocol as Alice-Bob notation. • Security properties: A description of what is the security property that the protocol intends to achieve. Discussion of weakness: Discuss if there exists any vulnerability within the protocol. • Justification: Improve if there is any flaw and then add an explanation of why the protocol does satisfy the intended security property.

Fig: 1