hws/hw10.tex
changeset 534 62985f147c85
parent 533 98ae49ffc262
parent 531 35ffb7a7eafa
child 535 c0e392a9c09a
equal deleted inserted replaced
533:98ae49ffc262 534:62985f147c85
     1 \documentclass{article}
       
     2 \usepackage{../style}
       
     3 
       
     4 \begin{document}
       
     5 
       
     6 \section*{Homework 10}
       
     7 
       
     8 \begin{enumerate}
       
     9 \item What are the main disadvantages of the following
       
    10       protocol that establishes a mutual key between two
       
    11       parties $A$ and $B$ with the help of a mutually trusted
       
    12       third party $S$:
       
    13 
       
    14 \begin{center}
       
    15 \begin{tabular}{l@{\hspace{2mm}}l}
       
    16 $A \to S :$ & $A, B$\\
       
    17 $S \to A :$ & $\{K_{AB}\}_{K_{AS}}$ and $\{\{K_{AB}\}_{K_{BS}} \}_{K_{AS}}$\\
       
    18 $A \to B :$ & $\{K_{AB}\}_{K_{BS}}$\\
       
    19 $A \to B :$ & $\{m\}_{K_{AB}}$\\
       
    20 \end{tabular}
       
    21 \end{center}
       
    22 
       
    23 \item In the context of buffer-overflow attacks, explain briefly
       
    24 what is meant by a \emph{NOP-sledge}.
       
    25 
       
    26 \end{enumerate}
       
    27 \end{document}
       
    28 
       
    29 %%% Local Variables: 
       
    30 %%% mode: latex
       
    31 %%% TeX-master: t
       
    32 %%% End: