PLease someone kind help.
1.Envision a scenario using a three-message mutualauthentication protocol, where Alice initiates contact with Bob. IfBob is a stateless server, then it is inconvenient to require himto remember the challenge he sent to Alice. Consider the use of thefollowing protocol to modify the exchange so that Alice sends thechallenge back to Bob, along with the encrypted challenge.

Is this protocol secure? Justify your answer.
Expert Answer
An answer will be send to you shortly. . . . .