The goal is for you to study a short (6-page) seminal and frequently cited paper "Using encryption for authentication in large networks of computers" that Roger Needham and Mike Schroeder published in 1978 in Comm. ACM. Despite its age, the paper is a definite must-read, an this assignment is also important for myself - I need to get an idea of your familiarity with technical English. The paper can be downloaded from http://portal.acm.org/citation.cfm?id=359659 (from muni.cz networks - library license!!!). Please submit your answers through the IS, ideally as ASCII text (use Latex-like notation where necessary), or as PDF or PS, or if really necessary - RTF. Appropriate folder "1st Assignment Solutions" is to be used. The questions follow: 1.1 (1 point) What are the assumptions on attacker capabilities? (Note that such strong assumptions are used for security modelling in protocols ever since.) 1.2 (1 point) Is the message 2.2 encrypted for confidentiality reasons? 1.3 (1 point) What is the (current and as such used for a number of years) name for functions that the authors call "characteristic" functions? 1.3 (1 point) What do the authors conclude in terms of using public- vs. shared-key crypto for entity authentication? 1.5 (2 points) What are the five major lessons/insights you gained from reading the paper? 1.6 (0 points ;-) How long it took you to deliver your solution to this assignment? ===== Enter your solutions in the IS no later than midnight Oct. 18th, and up to 6 points will be awarded.