below are two variations of the needham-schroeder algorithm. for each variation, state whether the protocol is secure; if it is, present an argument why it is so, if it is not, demonstrate an attack. (note: exclude from consideration attacks that assume eve is able to get the session