diff -r 4b53f83c070c -r 1c3d38cc34a9 hws/hw10.tex --- a/hws/hw10.tex Mon Nov 16 13:20:24 2015 +0000 +++ b/hws/hw10.tex Mon Nov 16 13:35:30 2015 +0000 @@ -6,7 +6,22 @@ \section*{Homework 10} \begin{enumerate} -\item +\item What are the main disadvantages of the following + protocol that establishes a mutual key between two + parties $A$ and $B$ with the help of a mutually trusted + third party $S$: + +\begin{center} +\begin{tabular}{l@{\hspace{2mm}}l} +$A \to S :$ & $A, B$\\ +$S \to A :$ & $\{K_{AB}\}_{K_{AS}}$ and $\{\{K_{AB}\}_{K_{BS}} \}_{K_{AS}}$\\ +$A \to B :$ & $\{K_{AB}\}_{K_{BS}}$\\ +$A \to B :$ & $\{m\}_{K_{AB}}$\\ +\end{tabular} +\end{center} + +\item In the context of buffer-overflow attacks, explain briefly +what is meant by a \emph{NOP-sledge}. \end{enumerate} \end{document}