diff -r bd25d9f9d9dc -r 34775227c84f hws/hw10.tex --- a/hws/hw10.tex Sat Sep 23 14:19:09 2017 +0100 +++ b/hws/hw10.tex Sat Sep 23 19:32:21 2017 +0100 @@ -6,22 +6,9 @@ \section*{Homework 10} \begin{enumerate} -\item What are the main disadvantages of the following - protocol that establishes a mutual key between two - parties $A$ and $B$ with the help of a mutually trusted - third party $S$: + -\begin{center} -\begin{tabular}{l@{\hspace{2mm}}l} -$A \to S :$ & $A, B$\\ -$S \to A :$ & $\{K_{AB}\}_{K_{AS}}$ and $\{\{K_{AB}\}_{K_{BS}} \}_{K_{AS}}$\\ -$A \to B :$ & $\{K_{AB}\}_{K_{BS}}$\\ -$A \to B :$ & $\{m\}_{K_{AB}}$\\ -\end{tabular} -\end{center} -\item In the context of buffer-overflow attacks, explain briefly -what is meant by a \emph{NOP-sledge}. \end{enumerate} \end{document}