1- \title {Tools of the Trade}
1+ \title {Lab: Tools of the Trade}
22\subtitle {A lab on the practicalities of security}
33
44\author {%
@@ -17,10 +17,10 @@ \section{Introduction}
1717systems produced.
1818This laboratory assignment focuses on the practical parts of security.
1919You have probably read a lot about different cryptographic mechanisms, e.g.~AES
20- \cite {aes } and CBC \cite {blockmodes }; intrusion detection systems of different
21- kinds, e.g.~network \cite {snort } and host-based \cite {ossec } intrusion
20+ \cite {aes } and CBC~ \cite {blockmodes }; intrusion detection systems of different
21+ kinds, e.g.\ network~ \cite {snort } and host-based~ \cite {ossec } intrusion
2222detection systems.
23- You might know that you should use huge prime numbers in RSA \cite {rsa }, but
23+ You might know that you should use huge prime numbers in RSA~ \cite {rsa }, but
2424how do you actually choose these in practice?
2525In this lab you are supposed to answer questions such as this and get to know
2626some implementations of what you previously only knew in theory.
@@ -41,10 +41,9 @@ \subsection{Scope and Aim}
4141
4242The next section covers what you must read before you understand this
4343assignment and how to do the work.
44- Section \ref {sec:tasks } covers the work to be done, i.e.~how you should learn
45- this.
46- Section \ref {sec:exam } covers how it will be examined, i.e.~how you show that
47- you have fulfilled the intended learning outcomes given above.
44+ \Cref {sec:tasks } covers the work to be done, i.e.~how you should learn this.
45+ \Cref {sec:exam } covers how it will be examined, i.e.~how you show that you have
46+ fulfilled the intended learning outcomes given above.
4847
4948
5049\section {Theory }
@@ -63,11 +62,11 @@ \section{Assignment}
6362 \item In a Diffie-Hellman key exchange you need a generator for a group, how
6463 do you find this one?
6564
66- \item There is no randomness in a computer program---since these are fully
67- deterministic---but how do we then get randomness to do cryptography using
68- a computer?
65+ \item There is no randomness in a computer program --- since these are fully
66+ deterministic --- but how do we then get randomness to do cryptography
67+ using a computer?
6968
70- \item How do you actually use SHA-256 \cite {shs } or bcrypt \cite {bcrypt } to
69+ \item How do you actually use SHA-256~ \cite {shs } or bcrypt~ \cite {bcrypt } to
7170 protect a password: how should you use them, what values should you use?
7271
7372 \item What features are actually available in an intrusion detection system,
@@ -124,4 +123,4 @@ \subsubsection*{Acknowledgements}
124123\url {https://github.com/dbosk/toolslab/}.
125124
126125
127- \printbibliography
126+ \printbibliography {}
0 commit comments