handouts/ho05.tex
changeset 409 0c04ec017892
parent 366 34a8f73b2c94
child 415 56bc53ba7c5b
equal deleted inserted replaced
408:9332d1e54360 409:0c04ec017892
   811 
   811 
   812 
   812 
   813 \subsubsection*{Further Reading}
   813 \subsubsection*{Further Reading}
   814 
   814 
   815 A blogpost that describes the first few milliseconds of an HTTPS connection
   815 A blogpost that describes the first few milliseconds of an HTTPS connection
   816 is here
   816 is at
   817 
   817 
   818 \begin{center}
   818 \begin{center}
   819 \url{http://www.moserware.com/2009/06/first-few-milliseconds-of-https.html}
   819 \url{http://www.moserware.com/2009/06/first-few-milliseconds-of-https.html}
   820 \end{center}
   820 \end{center}
   821 
   821 
   822 \noindent
   822 \noindent
   823 it disentangles every message sent between a client and a server.
   823 It disentangles every message sent between a client and a server.
   824 
   824 
   825 If you want to know more about how cars can be hijacked,
   825 If you want to know more about how cars can be hijacked,
   826 the paper  
   826 the paper  
   827 
   827 
   828 \begin{center}
   828 \begin{center}
   858 
   858 
   859 \noindent
   859 \noindent
   860 \ldots all in the name of having a better position for
   860 \ldots all in the name of having a better position for
   861 negotiations. Hmmm\ldots
   861 negotiations. Hmmm\ldots
   862 
   862 
       
   863 A paper how the NSA can decrypt so much of the encrypted 
       
   864 Internet traffic:
       
   865 
       
   866 \begin{center}
       
   867 \url{https://weakdh.org/imperfect-forward-secrecy.pdf}
       
   868 \end{center}
   863 
   869 
   864 \end{document}
   870 \end{document}
   865 
   871 
   866 %%% Local Variables: 
   872 %%% Local Variables: 
   867 %%% mode: latex
   873 %%% mode: latex