The document proposes a protocol for end-point authentication using nonces and public key cryptography involving Alice and Bob. It outlines the steps of the communication process and raises a question about potential vulnerabilities, specifically how an adversary, Trudy, could execute a man-in-the-middle attack. It also requests a diagram of the protocol and an explanation of the attack method without using certificates.