handouts/ho05.tex
changeset 458 aebcaa545f81
parent 456 f65e4fa6e902
child 469 7d4aa41b748e
equal deleted inserted replaced
457:38ef1ef6082d 458:aebcaa545f81
     7 
     7 
     8 %% the expectation is that anything encrypted today, will be
     8 %% the expectation is that anything encrypted today, will be
     9 %% decrypted in 20 years time
     9 %% decrypted in 20 years time
    10 
    10 
    11 %http://www.net.in.tum.de/fileadmin/TUM/teaching/netzsicherheit/ws1516/07_PKI.pdf
    11 %http://www.net.in.tum.de/fileadmin/TUM/teaching/netzsicherheit/ws1516/07_PKI.pdf
       
    12 
       
    13 %wifi-pumkin (real man-in-the-middle attacks)
       
    14 %http://www.hackingarticles.in/hack-password-using-rogue-wi-fi-access-point-attack-wifi-pumpkin/
       
    15 %https://github.com/P0cL4bs/WiFi-Pumpkin
    12 
    16 
    13 \section*{Handout 5 (Protocols)}
    17 \section*{Handout 5 (Protocols)}
    14 
    18 
    15 Protocols are the computer science equivalent to fractals and
    19 Protocols are the computer science equivalent to fractals and
    16 the Mandelbrot set in mathematics. With the latter two you
    20 the Mandelbrot set in mathematics. With the latter two you