In: Computer Science
Explain how timestamping would be used in a protocol to mitigate replay attack.
Replay attack :
For example: when one makes an order to the bank to transfer money to some specified account, the attacker may eavesdrop the frames. If that happens, the attacker can send the same (correct) messages to the bank one more time, hoping that the bank will transfer money again to the same account (probably connected with the intruder).
Using Timestamp to mitigate replay attack.