Get comprehensive solutions to your problems with IDNLearn.com. Ask your questions and get detailed, reliable answers from our community of knowledgeable experts.

Consider the following authentication protocol given in common syntax:
A, B : Principal
Nb : Nonce
pk : Principal -> Key
1. A->B: {A,B}pk(B)
2. B->A: {B,Nb}pk(A)
3. A->B: {Nb,A}pk(B)
We shall call this protocol PROTOCOL_TWO.

Construct an SPDL specification of PROTOCOL_TWO for verification in Scyther.