--- a/handouts/ho05.tex Thu Oct 30 00:49:51 2014 +0000
+++ b/handouts/ho05.tex Thu Oct 30 00:54:41 2014 +0000
@@ -362,7 +362,7 @@
could not have been a message that was generated before
I myself knew what $N$ is)
-\item if only you and me know the key $K_{IY$, the message
+\item if only you and me know the key $K_{IY}$, the message
must have come from you
\end{itemize}
@@ -637,7 +637,7 @@
Now the big question is, why on earth does this splitting
of messages in half and additional message exchange help
-with defending agains person-in-the-middle attacks? Well,
+with defending against person-in-the-middle attacks? Well,
lets try to be such an attacker. As before we intercept
the messages where public keys are exchanged and inject
our own.
@@ -783,7 +783,7 @@
the paper
\begin{center}
-\url{http://www.cs.ru.nl/~rverdult/Gone_in_360_Seconds_Hijacking_with_Hitag2-USENIX_2012.pdf}}
+\url{http://www.cs.ru.nl/~rverdult/Gone_in_360_Seconds_Hijacking_with_Hitag2-USENIX_2012.pdf}
\end{center}
\noindent is quite amusing to read. Obviously an even more