equal
deleted
inserted
replaced
275 \begin{frame}[c] |
275 \begin{frame}[c] |
276 |
276 |
277 \begin{center} |
277 \begin{center} |
278 \begin{tabular}{ll} |
278 \begin{tabular}{ll} |
279 \bl{$A \rightarrow B$:} & \bl{$N_A$}\\ |
279 \bl{$A \rightarrow B$:} & \bl{$N_A$}\\ |
280 \bl{$B \rightarrow A$:} & \bl{$\{N_A, N_B\}_{K_{ab}}$}\\ |
280 \bl{$B \rightarrow A$:} & \bl{$\{N_A, N_B\}_{K_{AB}}$}\\ |
281 \bl{$A \rightarrow B$:} & \bl{$N_B$}\\ |
281 \bl{$A \rightarrow B$:} & \bl{$N_B$}\\ |
282 \end{tabular} |
282 \end{tabular} |
283 \end{center} |
283 \end{center} |
284 |
284 |
285 The attack (let $A$ decrypt her own messages): |
285 The attack (let $A$ decrypt her own messages): |