# HG changeset patch # User Christian Urban # Date 1414630481 0 # Node ID 1e1008403f17c29b59b8cf087f9b2ed41b01dd75 # Parent 03321ef4349a33d28b5676d55a82c08460455a7b updated diff -r 03321ef4349a -r 1e1008403f17 handouts/ho05.pdf Binary file handouts/ho05.pdf has changed diff -r 03321ef4349a -r 1e1008403f17 handouts/ho05.tex --- a/handouts/ho05.tex Thu Oct 30 00:49:51 2014 +0000 +++ b/handouts/ho05.tex Thu Oct 30 00:54:41 2014 +0000 @@ -362,7 +362,7 @@ could not have been a message that was generated before I myself knew what $N$ is) -\item if only you and me know the key $K_{IY$, the message +\item if only you and me know the key $K_{IY}$, the message must have come from you \end{itemize} @@ -637,7 +637,7 @@ Now the big question is, why on earth does this splitting of messages in half and additional message exchange help -with defending agains person-in-the-middle attacks? Well, +with defending against person-in-the-middle attacks? Well, lets try to be such an attacker. As before we intercept the messages where public keys are exchanged and inject our own. @@ -783,7 +783,7 @@ the paper \begin{center} -\url{http://www.cs.ru.nl/~rverdult/Gone_in_360_Seconds_Hijacking_with_Hitag2-USENIX_2012.pdf}} +\url{http://www.cs.ru.nl/~rverdult/Gone_in_360_Seconds_Hijacking_with_Hitag2-USENIX_2012.pdf} \end{center} \noindent is quite amusing to read. Obviously an even more