Replay Attack. To resist the replay attack, our protocol uses short-term keys. The lifetime of the short-term keys (kAi and kBi , i 1, 2, .
Appears in 1 contract
Sources: Key Agreement Protocol
Replay Attack. To In order to resist the replay attack, our protocol uses short-term keys. The lifetime of the short-term keys (kAi and kBi , (i ∈ 1, 2, . . .) is only one session long, with a view of establishing (n2 + n) keys. The two parties have to randomly choose new short-term keys again in the next session. If the intruder attempts to replay the previously intercepted message to ▇▇▇ for masquerading as ▇▇▇▇▇, ▇▇▇ will find out and reject this message.
Appears in 1 contract
Sources: Key Agreement Protocol