Solution to Mutual Authentication

Because it is not possible to attack that protocol, here comes a short description why. Afterwards both parties can be sure with whom they communicate by means of mutual authentication, an attacker can eavesdrop the communication, but he will not get one of the private keys. Thus the two parties can establish a secure channel, by the use of asymmetrically encrypted messages.