Answered You can hire a professional tutor to get the answer.
Crypto Protocols 1.Suppose Alice and Bob have obtained each other's public keys securely.
Crypto Protocols
1.Suppose Alice and Bob have obtained each other's public keys securely. Please write a key agreement protocol that enables Alice and Bob to agree on a session key over an insecure communi- cation channel that fresh and authenticated to be only available to Alice and Bob.