updated
authorChristian Urban <christian dot urban at kcl dot ac dot uk>
Thu, 30 Oct 2014 00:54:41 +0000
changeset 274 1e1008403f17
parent 273 03321ef4349a
child 275 06a04b3b2dda
updated
handouts/ho05.pdf
handouts/ho05.tex
Binary file handouts/ho05.pdf has changed
--- a/handouts/ho05.tex	Thu Oct 30 00:49:51 2014 +0000
+++ b/handouts/ho05.tex	Thu Oct 30 00:54:41 2014 +0000
@@ -362,7 +362,7 @@
       could not have been a message that was generated before
       I myself knew what $N$ is)
 
-\item if only you and me know the key $K_{IY$, the message
+\item if only you and me know the key $K_{IY}$, the message
       must have come from you
 \end{itemize}
 
@@ -637,7 +637,7 @@
 
 Now the big question is, why on earth does this splitting
 of messages in half and additional message exchange help
-with defending agains person-in-the-middle attacks? Well,
+with defending against person-in-the-middle attacks? Well,
 lets try to be such an attacker. As before we intercept
 the messages where public keys are exchanged and inject
 our own.
@@ -783,7 +783,7 @@
 the paper  
 
 \begin{center}
-\url{http://www.cs.ru.nl/~rverdult/Gone_in_360_Seconds_Hijacking_with_Hitag2-USENIX_2012.pdf}}
+\url{http://www.cs.ru.nl/~rverdult/Gone_in_360_Seconds_Hijacking_with_Hitag2-USENIX_2012.pdf}
 \end{center}
 
 \noindent is quite amusing to read. Obviously an even more