Notes for November 16, 2000
- Greetings and Felicitations!
- Puzzle of the day
- Snake Oil Cryptography: Warning signs
- Pseudo-mathematical gobbledygook
- New mathematics
- Proprietary cryptography
- Extreme cluelessness
- Ridiculous key lengths
- One-time pads
- Unsubstantiated claims
- Security proofs
- Cracking contests
- Ultimate in aging: One-Time Pads
- Password is valid for only one use
- May work from list, or new password may be generated from old by a
function
- Example: S/Key(tm)
- Challenge-response systems
- Computer issues challenge, user presents response to verify secret
information known/item possessed
- Example operations: f(x) = x+1, random, string
(for users without computers), time of day, computer sends
E(x), you
answer E(D(E(x))+1)
- Note: password never sent on wire or network
- Attack: monkey-in-the-middle
- Defense: mutual authentication
- Biometrics
- Depend on physical characteristics
- Examples: pattern of typing (remarkably effective), retinal scans,
etc.
- Location
- Bind user to some location detection device (human, GPS)
- Authenticate by location of the device
- Identity
- Principal and identity
- Users, groups, roles
- Identity on the web
- Host identity: static and dynamic identifiers
- State and cookies
- Anonymous remailers
Puzzle of the Day
"Our ancestors, and those who were considered to be wise, were
accustomed to say that it was necessary to control Pistoia by means of
factions and Pisa by means of fortresses; so they fostered strife in
various of their subject towns, so as to control them more easily. In
those days, when there was stability of a sort in Italy, this was
doubtless sensible; but I do not think it makes a good rule today. I do
not believe any good at all ever comes from dissension. On the contrary,
on the approach of the enemy, cities which are so divided inevitably
succumb at once; the weaker faction will always go over to the invader,
and the other will not be able to hold out."1
What does this paragraph say to a system administrator or security
officer seeking insight to defend her systems?
Footnote
- Niccolò Machiavelli, The Prince, George Bull trans., Penguin
Books, New York, NY ©1995, p. 67
|
Matt Bishop
Office: 3059 Engineering Unit II
Phone: +1 (530) 752-8060
Fax: +1 (530) 752-4767
Email: bishop@cs.ucdavis.edu
|
Copyright Matt Bishop, 2000.
All federal and state copyrights reserved for all original material
presented in this course through any medium, including lecture or print.
|
Page last modified on 11/22/2000