Contact Us
This illustrates two good practices in cryptographic protocol design. First, the expected order of messages must be unambiguous in any given situation to avoid misinterpretations both on Alice’s and on Bob’s side. Second, because any deviation from the specified protocol must be treated as a potential attack attempt, the protocol must be stopped immediately, and the other party must be notified about the cause of the failure. The error message not only allows the other party to terminate the protocol but also leaves an audit trace for a potential investigation later on.