hws/hw05.tex
author Christian Urban <christian dot urban at kcl dot ac dot uk>
Tue, 21 Oct 2014 02:35:06 +0100
changeset 252 fa151c0a3cf4
parent 239 0db764174afb
child 276 d7109c6e721d
permissions -rw-r--r--
updated slides

\documentclass{article}
\usepackage{charter}
\usepackage{hyperref}
\usepackage{amssymb}

\begin{document}

\section*{Homework 5}

\begin{enumerate}
\item Consider the following simple mutual authentication protocol:

\begin{center}
\begin{tabular}{ll}
$A \rightarrow B$: & $N_a$\\  
$B \rightarrow A$: & $\{N_a, N_b\}_{K_{ab}}$\\
$A \rightarrow B$: & $N_b$\\
\end{tabular}
\end{center}

Explain how an attacker $B'$ can launch an impersonation attack by 
intercepting all messages for $B$ and make $A$ decrypt her own challenges.


\item Before starting a TCP connection, client and servers
perform a three-way handshake:

\begin{center}
\begin{tabular}{rl}
$A \rightarrow S$: & SYN\\
$S \rightarrow A$: & SYN-ACK\\
$A \rightarrow S$: & ACK\\
\end{tabular}
\end{center}

How can this protocol be abused causing trouble on the server?

\end{enumerate}
\end{document}

%%% Local Variables: 
%%% mode: latex
%%% TeX-master: t
%%% End: