1 , , 1 , , , and checks if and are both valid. » HA computes = ℎ ∥ ⊕ ⊕ , and = ℎ ⊕ ℎ ∥ , then does a decryption ℎ ∥ 0 ∥ = −1 1 . » Hashes the afore-computed , compares this ℎ to the one recovered from 1 . If matches, HA believes MN is authenticated. » HA does an encryption 2 ≜ ℎ ∥ ∥ 0 ∥ , and computes a signature 2 ≜ ℎ , , 2 , » HA sends FA a Msg-3: , 2 , 2 , , . 01/07/2011 S.-C. Chen, S.-H. Yang, T.-C. Li [at] CSIE, NTNU 12