Is This Perfect Forward Secrecy?
I have a textbook that contains the following problem:
In practice, one master key, KM, is exchanged in a secure way (e.g. Diffie-Hellman key exchange) between the involved parties. Afterwards, session keys, kx, are regularly updated by u…