What is Mj-authentication?
1.
MJ-Authentication
This is similar to the TCP/IP syn response during the setup phases of the 3-way handshake process. This response is specific to MJ-Authentication from the M party.
MJ-Authentication
J sends
ik to M
M send
iag to J
When both parties receive this symmetric key authentication has been performed and communication can safely continue.
See
Random Words:
1.
originated and mastered by Josh Estes, this delicious sex manuever originates from New Hampshire and is similar in nature to the clevela..