Introduction - If you have any usage issues, please Google them yourself
As communication between the parties A and B have shared a session master key Km. Upon completion of the distribution of session key Ks, A-Ks for the use of a specific file (test-1.txt) is encrypted and sent to B B using Ks to decrypt the ciphertext, and compare the decrypted plaintext message with the original files are consistent.