Perfect Forward/Backward Secrecy. If an adversary π obtains the session key in a session, he will not have access to other session keys in other session because session keys are computed independently, including random nonces (π₯ and π¦) and temporary ππΌπ·π and ππΌπ·π that change in each authentication session. Therefore, the proposed protocol preserves perfect forward backward secrecy.
Appears in 1 contract
Sources: Research Article
Perfect Forward/Backward Secrecy. If an adversary π obtains the session key in a session, he will not have access to other session keys in other session because session keys are computed independently, including random nonces (οΏ½( οΏ½ and π¦) and temporary ππΌπ·π and ππΌπ·π that change in each authentication session. Therefore, the proposed protocol preserves perfect forward backward secrecy.
Appears in 1 contract
Sources: Research Article