equal
deleted
inserted
replaced
811 |
811 |
812 |
812 |
813 \subsubsection*{Further Reading} |
813 \subsubsection*{Further Reading} |
814 |
814 |
815 A blogpost that describes the first few milliseconds of an HTTPS connection |
815 A blogpost that describes the first few milliseconds of an HTTPS connection |
816 is here |
816 is at |
817 |
817 |
818 \begin{center} |
818 \begin{center} |
819 \url{http://www.moserware.com/2009/06/first-few-milliseconds-of-https.html} |
819 \url{http://www.moserware.com/2009/06/first-few-milliseconds-of-https.html} |
820 \end{center} |
820 \end{center} |
821 |
821 |
822 \noindent |
822 \noindent |
823 it disentangles every message sent between a client and a server. |
823 It disentangles every message sent between a client and a server. |
824 |
824 |
825 If you want to know more about how cars can be hijacked, |
825 If you want to know more about how cars can be hijacked, |
826 the paper |
826 the paper |
827 |
827 |
828 \begin{center} |
828 \begin{center} |
858 |
858 |
859 \noindent |
859 \noindent |
860 \ldots all in the name of having a better position for |
860 \ldots all in the name of having a better position for |
861 negotiations. Hmmm\ldots |
861 negotiations. Hmmm\ldots |
862 |
862 |
|
863 A paper how the NSA can decrypt so much of the encrypted |
|
864 Internet traffic: |
|
865 |
|
866 \begin{center} |
|
867 \url{https://weakdh.org/imperfect-forward-secrecy.pdf} |
|
868 \end{center} |
863 |
869 |
864 \end{document} |
870 \end{document} |
865 |
871 |
866 %%% Local Variables: |
872 %%% Local Variables: |
867 %%% mode: latex |
873 %%% mode: latex |