For the protocol in Section 17.3, could an attacker gain any advantage in breaking the protocol by forcibly rebooting the key server? Posted on March 10, 2017 by admin For the protocol in Section 17.3, could an attacker gain any advantage in breaking the protocol by forcibly rebooting the key server?