--- a/handouts/ho05.tex Thu Nov 06 12:32:05 2014 +0000
+++ b/handouts/ho05.tex Thu Nov 06 17:41:55 2014 +0000
@@ -661,7 +661,7 @@
Now the big question is, why on earth does this splitting
of messages in half and additional message exchange help
with defending against person-in-the-middle attacks? Well,
-let's try to be such an attacker. As before we intercept
+let's try to be an attacker. As before we intercept
the messages where public keys are exchanged and inject
our own.
@@ -772,7 +772,7 @@
With this the protocol has ended. $E$ was able to decrypt all
messages, but what messages did $A$ and $B$ receive and from
whom? Do you notice that $A$ and $B$ will find out that
-something strange has happened and probably not talk on this
+something strange is going on and probably not talk on this
channel anymore? I leave you to think about it.
Recall from the beginning that a person-in-the middle