MS-E1687 - Advanced Topics in Cryptography V D, Lecture, 8.1.2024-8.4.2024
This course space end date is set to 08.04.2024 Search Courses: MS-E1687
03 Assignment
Krav för slutförande
Senaste inlämningsdatum: fredag, 26 januari 2024, 23:59
Exercise 1:
Explain the gap between the AKE^static model and/or the protocol description used in Brzuska-Jacobsen (which we read last week) and the real-life protocol deployment that enables the attack described in this paper. How would we need to change the AKE^static model or protocol description by Brzuska-Jacobsen in order to capture the attack scenario described in the paper?
(EDIT: Exercise 1 was edited on January 22 at 18:31 in order to clarify the question.)
Exercise 2:
Ask questions :-). (Instructions as in Assignment 1.)
- 22 januari 2024, 18:32