Suppose Alice and Bob decide to use the following “three-pass protocol” to setup

a shared secret session key K. First, Alice chooses a random K. Alice also

generates a random secret one-time pad key KA and XORs it with K. She sends M1

= KA K to Bob. Bob generates a random secret one-time pad key KB, XORs

what he receives with it to compute M2 = M1 KB,

a shared secret session key K. First, Alice chooses a random K. Alice also

generates a random secret one-time pad key KA and XORs it with K. She sends M1

= KA K to Bob. Bob generates a random secret one-time pad key KB, XORs

what he receives with it to compute M2 = M1 KB,