diff -r 47e06cb75837 -r 0b9a16ddd625 handouts/ho05.tex --- a/handouts/ho05.tex Thu Nov 06 12:32:05 2014 +0000 +++ b/handouts/ho05.tex Thu Nov 06 17:41:55 2014 +0000 @@ -661,7 +661,7 @@ Now the big question is, why on earth does this splitting of messages in half and additional message exchange help with defending against person-in-the-middle attacks? Well, -let's try to be such an attacker. As before we intercept +let's try to be an attacker. As before we intercept the messages where public keys are exchanged and inject our own. @@ -772,7 +772,7 @@ With this the protocol has ended. $E$ was able to decrypt all messages, but what messages did $A$ and $B$ receive and from whom? Do you notice that $A$ and $B$ will find out that -something strange has happened and probably not talk on this +something strange is going on and probably not talk on this channel anymore? I leave you to think about it. Recall from the beginning that a person-in-the middle