i have 3 questions that need to be solved using Scyther
this is the first question please check it and let me know
1. Session key setup I
Script [login to view URL] describes a protocol which is intended to enable I to generate a new session key and share it with R.
Analyse the protocol with Scyther and identify the attacks on it. Explain what is going on in each of the attacks and what the attacker does to achieve the attack.
Submit your explanation.