Skip to content

Commit 525948d

Browse files
committed
Merge pull request #1 from dbosk/master
Brings v1.0
2 parents 0db53bd + 0f3a21c commit 525948d

File tree

4 files changed

+17
-20
lines changed

4 files changed

+17
-20
lines changed

Makefile

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,8 @@
1-
FILES= tools.tex aims.tex literature.tex tools.bib
2-
3-
USE_LATEXMK= yes
4-
USE_BIBLATEX= yes
5-
61
.PHONY: all
72
all: tools.pdf
83

4+
FILES= tools.tex aims.tex literature.tex tools.bib
5+
96
tools.pdf: ${FILES} llncs
107

118

tools-contents.tex

Lines changed: 12 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
\title{Tools of the Trade}
1+
\title{Lab: Tools of the Trade}
22
\subtitle{A lab on the practicalities of security}
33

44
\author{%
@@ -17,10 +17,10 @@ \section{Introduction}
1717
systems produced.
1818
This laboratory assignment focuses on the practical parts of security.
1919
You have probably read a lot about different cryptographic mechanisms, e.g.~AES
20-
\cite{aes} and CBC \cite{blockmodes}; intrusion detection systems of different
21-
kinds, e.g.~network \cite{snort} and host-based \cite{ossec} intrusion
20+
\cite{aes} and CBC~\cite{blockmodes}; intrusion detection systems of different
21+
kinds, e.g.\ network~\cite{snort} and host-based~\cite{ossec} intrusion
2222
detection systems.
23-
You might know that you should use huge prime numbers in RSA \cite{rsa}, but
23+
You might know that you should use huge prime numbers in RSA~\cite{rsa}, but
2424
how do you actually choose these in practice?
2525
In this lab you are supposed to answer questions such as this and get to know
2626
some implementations of what you previously only knew in theory.
@@ -41,10 +41,9 @@ \subsection{Scope and Aim}
4141

4242
The next section covers what you must read before you understand this
4343
assignment and how to do the work.
44-
Section \ref{sec:tasks} covers the work to be done, i.e.~how you should learn
45-
this.
46-
Section \ref{sec:exam} covers how it will be examined, i.e.~how you show that
47-
you have fulfilled the intended learning outcomes given above.
44+
\Cref{sec:tasks} covers the work to be done, i.e.~how you should learn this.
45+
\Cref{sec:exam} covers how it will be examined, i.e.~how you show that you have
46+
fulfilled the intended learning outcomes given above.
4847

4948

5049
\section{Theory}
@@ -63,11 +62,11 @@ \section{Assignment}
6362
\item In a Diffie-Hellman key exchange you need a generator for a group, how
6463
do you find this one?
6564

66-
\item There is no randomness in a computer program---since these are fully
67-
deterministic---but how do we then get randomness to do cryptography using
68-
a computer?
65+
\item There is no randomness in a computer program --- since these are fully
66+
deterministic --- but how do we then get randomness to do cryptography
67+
using a computer?
6968

70-
\item How do you actually use SHA-256 \cite{shs} or bcrypt \cite{bcrypt} to
69+
\item How do you actually use SHA-256~\cite{shs} or bcrypt~\cite{bcrypt} to
7170
protect a password: how should you use them, what values should you use?
7271

7372
\item What features are actually available in an intrusion detection system,
@@ -124,4 +123,4 @@ \subsubsection*{Acknowledgements}
124123
\url{https://github.com/dbosk/toolslab/}.
125124

126125

127-
\printbibliography
126+
\printbibliography{}

tools.tex

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@
44
\usepackage[swedish,english]{babel}
55
\usepackage[hyphens]{url}
66
\usepackage{hyperref}
7-
\usepackage[natbib,style=alphabetic,maxbibnames=99]{biblatex}
7+
\usepackage{cleveref}
8+
\usepackage[natbib,style=numeric-comp,maxbibnames=99]{biblatex}
89
\addbibresource{tools.bib}
910

1011
\begin{document}

0 commit comments

Comments
 (0)