diff -r 98ae49ffc262 -r 62985f147c85 hws/hw05.tex --- a/hws/hw05.tex Tue Sep 26 12:03:24 2017 +0100 +++ b/hws/hw05.tex Tue Sep 26 12:10:41 2017 +0100 @@ -79,6 +79,30 @@ achieve that the transponder $T$ authenticates itself to the car $C$? Does the car authenticate itself to the transponder? +\item What are the main disadvantages of the following + protocol that establishes a mutual key between two + parties $A$ and $B$ with the help of a mutually trusted + third party $S$: + +\begin{center} +\begin{tabular}{l@{\hspace{2mm}}l} +$A \to S :$ & $A, B$\\ +$S \to A :$ & $\{K_{AB}\}_{K_{AS}}$ and $\{\{K_{AB}\}_{K_{BS}} \}_{K_{AS}}$\\ +$A \to B :$ & $\{K_{AB}\}_{K_{BS}}$\\ +$A \to B :$ & $\{m\}_{K_{AB}}$\\ +\end{tabular} +\end{center} + +\item Explain briefly the purpose of the certification authority in + the public-private key encryption scheme. + +\item Explain briefly what is meant by a certification authority + becoming ``too big to fail'' when it has issued a large number + of certificates. + +\item In which situations does it make sense to install + invalid (self-signed) certificates? + \item \POSTSCRIPT \end{enumerate}