hws/hw05.tex
changeset 239 0db764174afb
parent 155 c70342f08326
child 252 fa151c0a3cf4
equal deleted inserted replaced
238:6ba55ba5b588 239:0db764174afb
     6 \begin{document}
     6 \begin{document}
     7 
     7 
     8 \section*{Homework 5}
     8 \section*{Homework 5}
     9 
     9 
    10 \begin{enumerate}
    10 \begin{enumerate}
       
    11 \item Consider the following simple mutual authentication protocol:
       
    12 
       
    13 \begin{center}
       
    14 \begin{tabular}{ll}
       
    15 $A \rightarrow B$: & $N_a$\\  
       
    16 $B \rightarrow A$: & $\{N_a, N_b\}_{K_{ab}}$\\
       
    17 $A \rightarrow B$: & $N_b$\\
       
    18 \end{tabular}
       
    19 \end{center}
       
    20 
       
    21 Explain how an attacker $B'$ can launch an impersonation attack by 
       
    22 intercepting all messages for $B$ and make $A$ decrypt her own challenges.
       
    23 
       
    24 
    11 \item Access control is about deciding whether a principal that
    25 \item Access control is about deciding whether a principal that
    12 issues a request should be trusted on this request. Explain
    26 issues a request should be trusted on this request. Explain
    13 how such decision problems can be solved by using logic.
    27 how such decision problems can be solved by using logic.
    14 
    28 
    15 \item The informal meaning of the formula $P\;\textit{controls}\;F$ is 
    29 \item The informal meaning of the formula $P\;\textit{controls}\;F$ is