Discover the answers you need at Westonci.ca, a dynamic Q&A platform where knowledge is shared freely by a community of experts. Discover detailed answers to your questions from a wide network of experts on our comprehensive Q&A platform. Get detailed and accurate answers to your questions from a dedicated community of experts on our Q&A platform.

Consider the following authentication protocol given in common syntax:
A, B : Principal
Nb : Nonce
pk : Principal -> Key
1. A->B: {A,B}pk(B)
2. B->A: {B,Nb}pk(A)
3. A->B: {Nb,A}pk(B)
We shall call this protocol PROTOCOL_TWO.

Construct an SPDL specification of PROTOCOL_TWO for verification in Scyther.