Choose one cryptographic password-based authenticationprotocol that you normally use.
– What is the detailed protocol specification for your chosenauthentication protocol?
– Consider whether this protocol is secure against off-linedictionary attacks. If yes, provide a heuristic security proof. Ifnot, how would someone mount an off-line dictionary attack?
– Can you revise or redesign the protocol so that it is secureagainst off-line dictionary attacks? Please describe your detailedprotocol design and provide a heuristic security proof.
Expert Answer
An answer will be send to you shortly. . . . .