diff --git a/doc/report.pdf b/doc/report.pdf index 43f4e80..903733c 100644 Binary files a/doc/report.pdf and b/doc/report.pdf differ diff --git a/doc/report.tex b/doc/report.tex index de94de0..381ef02 100644 --- a/doc/report.tex +++ b/doc/report.tex @@ -81,7 +81,8 @@ line/.style={-latex} % the lesser the width the greater will be the diagram wi \draw[->] (c1) -| ([xshift=-1cm]mgen); \draw[->] (kgen) -| ([xshift=1cm]mgen); \end{tikzpicture} -\caption{This Diagram shows how an Attacker can calculate the Key $K$ and the Message $M_1$.} +\caption{This Diagram shows how an attacker can calculate the key $K$ and the message $M_1$. \newline + $C_x$, $C_y$ and $M_2$ are known to the attacker.} \end{figure} A few requirements must be satisfied in order to get hold of the $K$ and the $M_1$: \begin{itemize}