diff --git a/notes.ctb_HTML/cs306--Notes--Attacks.html b/notes.ctb_HTML/cs306--Notes--Attacks.html
index d673c92..b71e846 100644
--- a/notes.ctb_HTML/cs306--Notes--Attacks.html
+++ b/notes.ctb_HTML/cs306--Notes--Attacks.html
@@ -142,5 +142,5 @@
homework
-Attacks
eavesdropping
- Posses collection of ciphertext -> ciphertext only attack
- Posses collection of plaintext/ciphertext pairs -> known plaintext attack
- Posses collection of plaintext/ciphertext pairs for plaintexts selected by the attack -> chosen plaintext attack
- Posses collection of plaintext/ciphertext pairs for plaintexts and ciphertexts selected by the attacker -> chosen ciphertext attack
◇ EAV-attack
indistinguishability for a single message against an eavesdropper
• An attacker may posses a collection of plaintext/ciphertext pairs for plaintexts selected by the attacker
Statistical Attack
dictionary attacks
man in the middle attack
length-extension attack
brute force attack
birthday attack
replay attack
reflection attac
• Reordering attack -> verify the block index i
• Truncation attack
mix and match attack
etc...
+Attacks
eavesdropping
- Posses collection of ciphertext -> ciphertext only attack
- Posses collection of plaintext/ciphertext pairs -> known plaintext attack
- Posses collection of plaintext/ciphertext pairs for plaintexts selected by the attack -> chosen plaintext attack
- Posses collection of plaintext/ciphertext pairs for plaintexts and ciphertexts selected by the attacker -> chosen ciphertext attack
• An attacker may posses a collection of ciphertext:
◇ ciphertext only attack
◇ EAV-attack
▪indistinguishability for a single message against an eavesdropper
▪An attacker may posses a collection of plaintext/ciphertext pairs for plaintexts selected by the attacker
◇ Chosen plaintext attack
◇ CPA-attack
▪ indistinguishability for a single message against an eavesdropper
• An attacker may posses a collection of plaintext/ciphertext pairs for plaintexts selected by the attacker
Statistical Attack
dictionary attacks
man in the middle attack
length-extension attack
brute force attack
birthday attack
replay attack
reflection attac
• Reordering attack -> verify the block index i
• Truncation attack
mix and match attack
Alteration
Denial-of-service
Masquerading
Repudiation