Quiz
Which of the following is true?
- We gave a protocol for perfect forward security that did not involve forgetting anything.
- If timestamps are used rather than nonces, replay attacks might become possible where they weren't before.
- We gave a potentially successful man-in-the-middle attack for SSH.