updated
authorChristian Urban <christian dot urban at kcl dot ac dot uk>
Thu, 30 Oct 2014 00:49:51 +0000
changeset 273 03321ef4349a
parent 272 4f4612d5f670
child 274 1e1008403f17
updated
handouts/ho05.pdf
handouts/ho05.tex
Binary file handouts/ho05.pdf has changed
--- a/handouts/ho05.tex	Thu Oct 30 00:39:01 2014 +0000
+++ b/handouts/ho05.tex	Thu Oct 30 00:49:51 2014 +0000
@@ -771,15 +771,37 @@
 \end{enumerate}
 
 \noindent The assumption is that the key $K$ is only known to
-the car and the transponder. Again, I leave it to you to find
+the car and the transponder. The claim is that $C$ and $T$ can
+authenticate to each other. Again, I leave it to you to find
 out the magic why this protocol is immune from
 person-in-the-middle attacks. 
 
 
 \subsubsection*{Further Reading}
 
-{\small
+If you want to know more about how cars can be hijacked,
+the paper  
+
+\begin{center}
 \url{http://www.cs.ru.nl/~rverdult/Gone_in_360_Seconds_Hijacking_with_Hitag2-USENIX_2012.pdf}}
+\end{center}
+
+\noindent is quite amusing to read. Obviously an even more
+amusing paper would be ``Dismantling Megamos Crypto: 
+Wirelessly Lockpicking a Vehicle Immobilizer'' but because
+of the court injuction by VW we are denied this entertainment.
+
+Person-in-the-middle-attacks in the ``wild'' are described 
+with real data in the blog post
+
+\begin{center}
+\url{http://www.renesys.com/2013/11/mitm-internet-hijacking}
+\end{center}
+
+\noindent The conclusion in this post is that person-in-the-middle-attacks
+can be launched from any place on Earth---it is not required 
+to sit in the ``middle'' of the communication of two people.
+You just have to route their traffic through a node you own.
 
 \end{document}