D. De-Synchronization Attack
The protocol also suffers from integrity during the communication
flows against the malicious adversary A. When A
injects a random message to the second message at Step 4, the
synchronization between R and T can be broken. The attack
can be described as follows.