January 29, 2002
Practical Aspects of Modern Cryptography
48
Internet Protocols
n
All subsequent secure messages
are sent using the symmetric
key and a keyed hash for
message authentication.