equal
deleted
inserted
replaced
1 \documentclass{article} |
|
2 \usepackage{../style} |
|
3 |
|
4 \begin{document} |
|
5 |
|
6 \section*{Homework 10} |
|
7 |
|
8 \begin{enumerate} |
|
9 \item What are the main disadvantages of the following |
|
10 protocol that establishes a mutual key between two |
|
11 parties $A$ and $B$ with the help of a mutually trusted |
|
12 third party $S$: |
|
13 |
|
14 \begin{center} |
|
15 \begin{tabular}{l@{\hspace{2mm}}l} |
|
16 $A \to S :$ & $A, B$\\ |
|
17 $S \to A :$ & $\{K_{AB}\}_{K_{AS}}$ and $\{\{K_{AB}\}_{K_{BS}} \}_{K_{AS}}$\\ |
|
18 $A \to B :$ & $\{K_{AB}\}_{K_{BS}}$\\ |
|
19 $A \to B :$ & $\{m\}_{K_{AB}}$\\ |
|
20 \end{tabular} |
|
21 \end{center} |
|
22 |
|
23 \item In the context of buffer-overflow attacks, explain briefly |
|
24 what is meant by a \emph{NOP-sledge}. |
|
25 |
|
26 \end{enumerate} |
|
27 \end{document} |
|
28 |
|
29 %%% Local Variables: |
|
30 %%% mode: latex |
|
31 %%% TeX-master: t |
|
32 %%% End: |
|