--- a/hws/hw05.tex Thu Dec 03 13:46:18 2015 +0000
+++ b/hws/hw05.tex Tue Jan 05 01:37:31 2016 +0000
@@ -49,19 +49,6 @@
Write down three facts that $A$ can infer after this protocol has been
successfully completed?
-\item (\textbf{Deleted}: same as 2) Before starting a TCP connection, client and servers
-perform a three-way handshake:
-
-\begin{center}
-\begin{tabular}{rl}
-$A \rightarrow S$: & SYN\\
-$S \rightarrow A$: & SYN-ACK\\
-$A \rightarrow S$: & ACK\\
-\end{tabular}
-\end{center}
-
-How can this protocol be abused causing trouble on the server?
-
\item Write down a protocol which establishes a secret key
between $A$ and $B$ using a mutually trusted third party $S$.
You can assume $A$ and $S$, respectfully $B$ and $S$, share