diff --git a/lecture3.html b/lecture3.html
index 10f4095..e9b8468 100644
--- a/lecture3.html
+++ b/lecture3.html
@@ -117,11 +117,11 @@
Socket
- Handshaking (connection establishment)
- - The server listens at
[dst_ip,dsp_port]
+ - The server listens at
[dst_ip,dst_port]
- Three-way handshake:
- the client sends a connection request with TCP flags (SYN, x=rand)
- - the server respons with its own TCP flags (SYN ACK, x+1 y=rand)
+ - the server responds with its own TCP flags (SYN ACK, x+1 y=rand)
- the client acknowledges the response, can send data along (ACK, y+1 x+1)
- Result is a socket (virtual communication channel) with unique identification:
@@ -376,7 +376,7 @@ HTTP pipelining
- Important optimization – response queuing
- - Allows to relecote FIFO queue from the client to the server
+ - Allows to relocate FIFO queue from the client to the server
- Requests are pipelined one after another
@@ -399,7 +399,7 @@ HTTP pipelining
- Buffered (large or many) responses may exhaust server resources
- A failed response may terminate TCP connection
- - A client must request all sub-sequent resources again (dupplicate processing)
+
- A client must request all sub-sequent resources again (duplicate processing)
- Some intermediaries may not support pipelining and abort connection
@@ -777,7 +777,7 @@ TLS Services
- Integrity
- - TLS provives message framing mechanism
+ - TLS provides message framing mechanism
- Every message is signed with Message Authentication Code (MAC)
- MAC hashes data in a message and combines the resulting hash with a key (negotiated during the TLS
@@ -814,7 +814,7 @@
Key Exchange
- The client generates a symetric key
- The client encrypts the key with the server's public key
- - The client sends the encrpyed key to the server
+ - The client sends the encrypted key to the server
- The server uses its private key to decrypt the symetric key
- RSA critical weekness
@@ -831,7 +831,7 @@ Key Exchange
- Diffie-Hellman key exhange
- - Client and server can negoriate shared secret without its explicit communication
+ - Client and server can negotiate shared secret without its explicit communication
- Attacker cannot get the key