equal
deleted
inserted
replaced
4 \begin{document} |
4 \begin{document} |
5 |
5 |
6 \section*{Homework 10} |
6 \section*{Homework 10} |
7 |
7 |
8 \begin{enumerate} |
8 \begin{enumerate} |
9 \item What are the main disadvantages of the following |
|
10 protocol that establishes a mutual key between two |
|
11 parties $A$ and $B$ with the help of a mutually trusted |
|
12 third party $S$: |
|
13 |
9 |
14 \begin{center} |
|
15 \begin{tabular}{l@{\hspace{2mm}}l} |
|
16 $A \to S :$ & $A, B$\\ |
|
17 $S \to A :$ & $\{K_{AB}\}_{K_{AS}}$ and $\{\{K_{AB}\}_{K_{BS}} \}_{K_{AS}}$\\ |
|
18 $A \to B :$ & $\{K_{AB}\}_{K_{BS}}$\\ |
|
19 $A \to B :$ & $\{m\}_{K_{AB}}$\\ |
|
20 \end{tabular} |
|
21 \end{center} |
|
22 |
10 |
23 \item In the context of buffer-overflow attacks, explain briefly |
11 |
24 what is meant by a \emph{NOP-sledge}. |
|
25 |
12 |
26 \end{enumerate} |
13 \end{enumerate} |
27 \end{document} |
14 \end{document} |
28 |
15 |
29 %%% Local Variables: |
16 %%% Local Variables: |