hws/hw10.tex
changeset 521 34775227c84f
parent 432 1c3d38cc34a9
equal deleted inserted replaced
520:bd25d9f9d9dc 521:34775227c84f
     4 \begin{document}
     4 \begin{document}
     5 
     5 
     6 \section*{Homework 10}
     6 \section*{Homework 10}
     7 
     7 
     8 \begin{enumerate}
     8 \begin{enumerate}
     9 \item What are the main disadvantages of the following
       
    10       protocol that establishes a mutual key between two
       
    11       parties $A$ and $B$ with the help of a mutually trusted
       
    12       third party $S$:
       
    13 
     9 
    14 \begin{center}
       
    15 \begin{tabular}{l@{\hspace{2mm}}l}
       
    16 $A \to S :$ & $A, B$\\
       
    17 $S \to A :$ & $\{K_{AB}\}_{K_{AS}}$ and $\{\{K_{AB}\}_{K_{BS}} \}_{K_{AS}}$\\
       
    18 $A \to B :$ & $\{K_{AB}\}_{K_{BS}}$\\
       
    19 $A \to B :$ & $\{m\}_{K_{AB}}$\\
       
    20 \end{tabular}
       
    21 \end{center}
       
    22 
    10 
    23 \item In the context of buffer-overflow attacks, explain briefly
    11 
    24 what is meant by a \emph{NOP-sledge}.
       
    25 
    12 
    26 \end{enumerate}
    13 \end{enumerate}
    27 \end{document}
    14 \end{document}
    28 
    15 
    29 %%% Local Variables: 
    16 %%% Local Variables: