updated
authorChristian Urban <christian dot urban at kcl dot ac dot uk>
Fri, 26 Sep 2014 10:01:46 +0100
changeset 183 6ed7c9b8b291
parent 182 681e35f6b0e4
child 184 55968b3205cc
updated
handouts/ho01.pdf
handouts/ho01.tex
Binary file handouts/ho01.pdf has changed
--- a/handouts/ho01.tex	Fri Sep 26 02:42:00 2014 +0100
+++ b/handouts/ho01.tex	Fri Sep 26 10:01:46 2014 +0100
@@ -484,7 +484,7 @@
 compiling a list for a dictionary attack is not as simple as
 it might seem. At the beginning only ``real'' dictionaries
 were available (like the Oxford English Dictionary), but such
-dictionary are not ``optimised'' for the purpose of passwords.
+dictionaries are not ``optimised'' for the purpose of passwords.
 The first real hard date was obtained when a company called
 RockYou ``lost'' 32 Million plain-text password. With this
 data of real-life passwords, dictionary attacks took off.
@@ -536,7 +536,8 @@
 as shown above and is actually stored as part of the password
 entry. Knowing the salt does not give the attacker any
 advantage, but prevents that dictionaries can be precompiled.
-
+The moral is that you should never store passwords in plain 
+text. Never ever.
 
 \end{document}