diff -r 80fd3cd5675f -r cceb3d2dcba0 hws/hw05.tex --- a/hws/hw05.tex Thu Dec 03 13:46:18 2015 +0000 +++ b/hws/hw05.tex Tue Jan 05 01:37:31 2016 +0000 @@ -49,19 +49,6 @@ Write down three facts that $A$ can infer after this protocol has been successfully completed? -\item (\textbf{Deleted}: same as 2) Before starting a TCP connection, client and servers -perform a three-way handshake: - -\begin{center} -\begin{tabular}{rl} -$A \rightarrow S$: & SYN\\ -$S \rightarrow A$: & SYN-ACK\\ -$A \rightarrow S$: & ACK\\ -\end{tabular} -\end{center} - -How can this protocol be abused causing trouble on the server? - \item Write down a protocol which establishes a secret key between $A$ and $B$ using a mutually trusted third party $S$. You can assume $A$ and $S$, respectfully $B$ and $S$, share