hws/hw10.tex
author Christian Urban <urbanc@in.tum.de>
Wed, 31 May 2017 09:26:47 +0100
changeset 514 a118052cf1d4
parent 432 1c3d38cc34a9
child 521 34775227c84f
permissions -rw-r--r--
updated

\documentclass{article}
\usepackage{../style}

\begin{document}

\section*{Homework 10}

\begin{enumerate}
\item What are the main disadvantages of the following
      protocol that establishes a mutual key between two
      parties $A$ and $B$ with the help of a mutually trusted
      third party $S$:

\begin{center}
\begin{tabular}{l@{\hspace{2mm}}l}
$A \to S :$ & $A, B$\\
$S \to A :$ & $\{K_{AB}\}_{K_{AS}}$ and $\{\{K_{AB}\}_{K_{BS}} \}_{K_{AS}}$\\
$A \to B :$ & $\{K_{AB}\}_{K_{BS}}$\\
$A \to B :$ & $\{m\}_{K_{AB}}$\\
\end{tabular}
\end{center}

\item In the context of buffer-overflow attacks, explain briefly
what is meant by a \emph{NOP-sledge}.

\end{enumerate}
\end{document}

%%% Local Variables: 
%%% mode: latex
%%% TeX-master: t
%%% End: