Lecture 24 Outline (May 22, 2015)

Reading: §11.4.1, 12, 15
Assignment: Homework 4, due June 3, 2015 (no late assignments accepted)

  1. Greetings and felicitations!
  2. Anonymous mailings
    1. Cypherpunk remailer
    2. Mixmaster remailer
  3. Authentication
    1. Validating client (user) identity
    2. Validating server (system) identity
    3. Validating both (mutual authentication)
    4. Basis: what you know/have/are, where you are
  4. Passwords
    1. Selection techniques
    2. Storage techniques such as hashing
    3. Password sniffing
  5. Challenge-response techniques
    1. One-time passwords
    2. Encrypted key exchange
    3. Hardware support
  6. Biometrics
    1. Depend on physical characteristics
    2. Examples: pattern of typing (remarkably effective), retinal scans, etc.
  7. Location
    1. Bind user to some location detection device (human, GPS)
    2. Authenticate by location of the device
  8. Access Control Lists
    1. UNIX method
    2. ACLs: describe, revocation issue
  9. Capabilities
    1. Capability-based addressing
    2. Inheritance of C-Lists
    3. Revocation: use of a global descriptor table

Discussion Problem. Last fall, in the wake of the Snowden revelations of widespread NSA snooping, Google, Apple, and a number of other technology companies announced plans to encrypt user data. FBI Director James Comey demanded that technology companies build in “backdoors”. That way, if law enforcement needed access to the data, would be able to obtain the data even if the data were encrypted.

What technical problems might such a wiretap “back door” create?

You can also obtain a PDF version of this. Version of May 21, 2015 at 6:15PM