handouts/ho05.tex
changeset 287 0b9a16ddd625
parent 286 47e06cb75837
child 293 4e2eb1039ba5
--- a/handouts/ho05.tex	Thu Nov 06 12:32:05 2014 +0000
+++ b/handouts/ho05.tex	Thu Nov 06 17:41:55 2014 +0000
@@ -661,7 +661,7 @@
 Now the big question is, why on earth does this splitting
 of messages in half and additional message exchange help
 with defending against person-in-the-middle attacks? Well,
-let's try to be such an attacker. As before we intercept
+let's try to be an attacker. As before we intercept
 the messages where public keys are exchanged and inject
 our own.
 
@@ -772,7 +772,7 @@
 With this the protocol has ended. $E$ was able to decrypt all
 messages, but what messages did $A$ and $B$ receive and from
 whom? Do you notice that $A$ and $B$ will find out that
-something strange has happened and probably not talk on this
+something strange is going on and probably not talk on this
 channel anymore? I leave you to think about it.
 
 Recall from the beginning that a person-in-the middle