hws/hw05.tex
changeset 442 cceb3d2dcba0
parent 414 9a3aa8c39951
child 459 514485146641
--- a/hws/hw05.tex	Thu Dec 03 13:46:18 2015 +0000
+++ b/hws/hw05.tex	Tue Jan 05 01:37:31 2016 +0000
@@ -49,19 +49,6 @@
 Write down three facts that $A$ can infer after this protocol has been
 successfully completed?
 
-\item (\textbf{Deleted}: same as 2) Before starting a TCP connection, client and servers
-perform a three-way handshake:
-
-\begin{center}
-\begin{tabular}{rl}
-$A \rightarrow S$: & SYN\\
-$S \rightarrow A$: & SYN-ACK\\
-$A \rightarrow S$: & ACK\\
-\end{tabular}
-\end{center}
-
-How can this protocol be abused causing trouble on the server?
-
 \item Write down a protocol which establishes a secret key
 between $A$ and $B$ using a mutually trusted third party $S$.
 You can assume $A$ and $S$, respectfully $B$ and $S$, share