ladynayan1429 ladynayan1429 08-01-2024 Computers and Technology contestada Analyse how the protocol below exhibits a naming flaw, and construct an attack that allows an adversary to impersonate B. (1) A → B : Na (2) B → A : {Na, Nb}Kab (3) A → B : Nb