\documentclass{article}
\usepackage{../style}
\begin{document}
\section*{Homework 10}
\begin{enumerate}
\item What are the main disadvantages of the following
protocol that establishes a mutual key between two
parties $A$ and $B$ with the help of a mutually trusted
third party $S$:
\begin{center}
\begin{tabular}{l@{\hspace{2mm}}l}
$A \to S :$ & $A, B$\\
$S \to A :$ & $\{K_{AB}\}_{K_{AS}}$ and $\{\{K_{AB}\}_{K_{BS}} \}_{K_{AS}}$\\
$A \to B :$ & $\{K_{AB}\}_{K_{BS}}$\\
$A \to B :$ & $\{m\}_{K_{AB}}$\\
\end{tabular}
\end{center}
\item In the context of buffer-overflow attacks, explain briefly
what is meant by a \emph{NOP-sledge}.
\end{enumerate}
\end{document}
%%% Local Variables:
%%% mode: latex
%%% TeX-master: t
%%% End: