hws/hw05.tex
changeset 442 cceb3d2dcba0
parent 414 9a3aa8c39951
child 459 514485146641
equal deleted inserted replaced
441:80fd3cd5675f 442:cceb3d2dcba0
    47 \end{center}
    47 \end{center}
    48 
    48 
    49 Write down three facts that $A$ can infer after this protocol has been
    49 Write down three facts that $A$ can infer after this protocol has been
    50 successfully completed?
    50 successfully completed?
    51 
    51 
    52 \item (\textbf{Deleted}: same as 2) Before starting a TCP connection, client and servers
       
    53 perform a three-way handshake:
       
    54 
       
    55 \begin{center}
       
    56 \begin{tabular}{rl}
       
    57 $A \rightarrow S$: & SYN\\
       
    58 $S \rightarrow A$: & SYN-ACK\\
       
    59 $A \rightarrow S$: & ACK\\
       
    60 \end{tabular}
       
    61 \end{center}
       
    62 
       
    63 How can this protocol be abused causing trouble on the server?
       
    64 
       
    65 \item Write down a protocol which establishes a secret key
    52 \item Write down a protocol which establishes a secret key
    66 between $A$ and $B$ using a mutually trusted third party $S$.
    53 between $A$ and $B$ using a mutually trusted third party $S$.
    67 You can assume $A$ and $S$, respectfully $B$ and $S$, share 
    54 You can assume $A$ and $S$, respectfully $B$ and $S$, share 
    68 secret keys.
    55 secret keys.
    69 
    56