Slide 1Network Security: Protocol Analysis, Firewalls Tuomas Aura Slide 2 Protocol analysis: Classic key-exchange protocols and flaws Slide 3 3 Needham-Schroeder secret-key…