Final Study Guide
This is simply a guide of topics that I consider important for the final. I don’t promise to ask you about them all, or about any of these in particular; but I may very well ask you about any of these, as well as anything we discussed in class, in the discussion section, or that is in the readings (including the papers).
- Everything contained in the midterm study guide
- Confidentiality Models
- Bell-LaPadula Model
- Lattices and the BLP Model
- Tranquility
- Integrity Models
- Biba Model
- Clark-Wilson model
- Cryptography
- Types of attacks: ciphertext only, known plaintext, chosen plaintext
- Classical ciphers, Cæsar cipher, Vigenère cipher, one-time pad, AES
- Public key cryptosystems; RSA
- Confidentiality and authentication with secret key and public key systems
- Cryptographic hash functions
- Digital signatures
- Key Distribution Protocols
- Kerberos and Needham-Schroeder
- Certificates and public key infrastructure
- Authentication
- Passwords (selection, storage, attacks, aging)
- One-way hash functions (cryptographic hash functions)
- UNIX password scheme, what the salt is and its role
- Password selection, aging
- Challenge-response schemes
- EKE protocol
- Biometrics and other validation techniques
- Identity and Anonymity
- Users, groups, and roles
- Identity in certificates
- Host identity (on the web)
- Web cookies
- Tor
- Cypherpunk, mixmaster remailers
- Assurance
- Electronic voting