hws/hw10.tex
changeset 432 1c3d38cc34a9
parent 431 4b53f83c070c
child 521 34775227c84f
--- a/hws/hw10.tex	Mon Nov 16 13:20:24 2015 +0000
+++ b/hws/hw10.tex	Mon Nov 16 13:35:30 2015 +0000
@@ -6,7 +6,22 @@
 \section*{Homework 10}
 
 \begin{enumerate}
-\item 
+\item What are the main disadvantages of the following
+      protocol that establishes a mutual key between two
+      parties $A$ and $B$ with the help of a mutually trusted
+      third party $S$:
+
+\begin{center}
+\begin{tabular}{l@{\hspace{2mm}}l}
+$A \to S :$ & $A, B$\\
+$S \to A :$ & $\{K_{AB}\}_{K_{AS}}$ and $\{\{K_{AB}\}_{K_{BS}} \}_{K_{AS}}$\\
+$A \to B :$ & $\{K_{AB}\}_{K_{BS}}$\\
+$A \to B :$ & $\{m\}_{K_{AB}}$\\
+\end{tabular}
+\end{center}
+
+\item In the context of buffer-overflow attacks, explain briefly
+what is meant by a \emph{NOP-sledge}.
 
 \end{enumerate}
 \end{document}