✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
How does the station-to-station (STS) protocol defend against the intruder-in-the-middle attack in the Diffie-Hellman protocol?