diff -r 03321ef4349a -r 1e1008403f17 handouts/ho05.tex --- a/handouts/ho05.tex Thu Oct 30 00:49:51 2014 +0000 +++ b/handouts/ho05.tex Thu Oct 30 00:54:41 2014 +0000 @@ -362,7 +362,7 @@ could not have been a message that was generated before I myself knew what $N$ is) -\item if only you and me know the key $K_{IY$, the message +\item if only you and me know the key $K_{IY}$, the message must have come from you \end{itemize} @@ -637,7 +637,7 @@ Now the big question is, why on earth does this splitting of messages in half and additional message exchange help -with defending agains person-in-the-middle attacks? Well, +with defending against person-in-the-middle attacks? Well, lets try to be such an attacker. As before we intercept the messages where public keys are exchanged and inject our own. @@ -783,7 +783,7 @@ the paper \begin{center} -\url{http://www.cs.ru.nl/~rverdult/Gone_in_360_Seconds_Hijacking_with_Hitag2-USENIX_2012.pdf}} +\url{http://www.cs.ru.nl/~rverdult/Gone_in_360_Seconds_Hijacking_with_Hitag2-USENIX_2012.pdf} \end{center} \noindent is quite amusing to read. Obviously an even more