equal
deleted
inserted
replaced
77 \item $T \to C$: $r, G'$ |
77 \item $T \to C$: $r, G'$ |
78 \item $C$ checks that $G = G'$ |
78 \item $C$ checks that $G = G'$ |
79 \end{enumerate} |
79 \end{enumerate} |
80 |
80 |
81 In Step 2 and 4 a message is split into two halves. Explain |
81 In Step 2 and 4 a message is split into two halves. Explain |
82 what the purpose of this split is? |
82 what the purpose of this split is? Assume the key $K$ is shared |
|
83 only between the car and the transponder. Does the protocol |
|
84 achieve that the transponder $T$ authenticates itself to the car |
|
85 $C$? Does the car authenticate itself to the transponder? |
83 |
86 |
84 |
87 |
85 |
88 |
86 \end{enumerate} |
89 \end{enumerate} |
87 \end{document} |
90 \end{document} |