--- a/handouts/ho01.tex Sat Jan 21 00:37:20 2017 +0000
+++ b/handouts/ho01.tex Sat Jan 21 00:39:23 2017 +0000
@@ -18,6 +18,18 @@
% how to store passwords
%https://nakedsecurity.sophos.com/2013/11/20/serious-security-how-to-store-your-users-passwords-safely/
+%hashes
+%http://web.archive.org/web/20071226014140/http://www.cits.rub.de/MD5Collisions/
+%https://blog.codinghorror.com/speed-hashing/
+%https://blogs.dropbox.com/tech/2016/09/how-dropbox-securely-stores-your-passwords/
+
+% Hello Kitty database stolen
+% https://nakedsecurity.sophos.com/2017/01/10/stolen-details-of-3-3m-hello-kitty-fans-including-kids-published-online/
+%
+
+% IoT
+% https://nakedsecurity.sophos.com/2015/10/26/the-internet-of-things-stop-the-things-i-want-to-get-off/
+
\section*{Handout 1 (Security Engineering)}
Binary file hws/hw05.pdf has changed
--- a/hws/hw05.tex Sat Jan 21 00:37:20 2017 +0000
+++ b/hws/hw05.tex Sat Jan 21 00:39:23 2017 +0000
@@ -57,7 +57,7 @@
\item Write down a protocol which establishes a secret key
between $A$ and $B$ using a mutually trusted third party $S$.
-You can assume $A$ and $S$, respectfully $B$ and $S$, share
+You can assume $A$ and $S$, respectively $B$ and $S$, share
secret keys.
\item Consider the following protocol between a car and a