Quote:
Originally Posted by FoxDisc
If this process is done 6 times, with 6 keys, there is a potential for quite a bit of information about the attacker.
|
Just one Sequence Key is used in the 6 SKBs. Any uncompromised SK is valid for any SKB.
To avoid duplication, i will answer the rest on another post.