Notes for November 7, 2000
- Greetings and Felicitations!
- Puzzle of the day
- Cryptographic Key Infrastructure
- Certificates (X.509, PGP)
- Certificate, key revocation
- Key Escrow
- Digital Signatures
- Judge can confirm, to the limits of technology, that claimed signer
did sign message
- RSA digital signatures: sign, then encipher
- Types of attacks
- Forward searches
- Misordered blocks
- Statistical regularities (repetitions)
- Stream ciphers
- LFSR: n bit register, tap sequence; shift 1 bit right, insert
t0r0+...+tn-1rn-1;
can choose period up to 2n-1
- Self-healing mode
- Block ciphers
- Cipher block chaining
- Networks and ciphers
- Where to put the encryption
- Link vs. end-to-end
- Example protocol: PEM
- Design goals
- How it was done
- Differences between it and PGP
Puzzle of the Day
An educational company is developing a class that will use
"distance learning." The idea is that students can reside at
any node on the Internet. The student will download class materials,
work independently, and submit the results by electronic mail (or some
other prearranged method). During specific times, TAs and the instructor
will be on line and available via an interactive conferencing system
called Remote Tutor. But there's one problem: giving tests. The company
plans to give interactive tests, with questions being posed and the
student answering in real time. The student will be at the remote node,
of course.
- From the company's point of view, what is the security problem in
this scheme? Assume both the connection and the server (to which the
test answers are sent) are secure enough so the company is not worried
about their compromise.
- How would you ameliorate the problem?
|
Matt Bishop
Office: 3059 Engineering Unit II
Phone: +1 (530) 752-8060
Fax: +1 (530) 752-4767
Email: bishop@cs.ucdavis.edu
|
Copyright Matt Bishop, 2000.
All federal and state copyrights reserved for all original material
presented in this course through any medium, including lecture or print.
|
Page last modified on 11/22/2000