Now we look at a simple replay attack. After a protocol session of an initiator and a responder , an intruder stores all the messages sent in the session. Then, tries to re-send the packets to to impersonate as . If can trick to finish its session believing it is talking to , then the protocol is flawed and is discarded. Similarly, can launch the simple replay attack to as well. The purpose for this attack is just to check whether nonces are used in a correct way. The intruder does not try to encrypt or decrypt messages or alter the received messages and hence is very efficient.