Skip to content

Latest commit

 

History

History
3 lines (3 loc) · 460 Bytes

README.md

File metadata and controls

3 lines (3 loc) · 460 Bytes

For successful stimulation of this protocol I used several classes that are interconnected for the realization of the project.

  • The requests and answers that are implemented are explained in the User class in the code in each step separately "Steps".
  • In my opinion it is not possible to perform a Man-In-The-Middle attack because it is an asymmetric signature and verification, and each exchanged parameter is encrypted / decrypted using a symmetric key.