I came across many such symmetric-based protocols claiming perfect forward secrecy, but careful analysis always ended in incorrectness of the claim. Therefore, it will be very helpful if someone elaborates with an example, in case it is possible.

More Inam Ul Haq's questions See All
Similar questions and discussions