Add to Chrome
Which one of the guidelines below is not part of the Abadi-Needham Protocols Design Guidelines?
All messages should be encrypted whenever possible.
Every message should say what it means, its interpretation should only depend on its content.
One should be clear on how the timeliness of messages is proven.
Any implicit assumptions in the protocol should be clearly spelled out.
Select the true statement. Nonces are used in authentication protocols to...
...establish a shared secret between parties.
...prevent replay attacks by ensuring message freshness.
..encrypt the session key securely.
...ensure the confidentiality of the communication.