slides/slides08.tex
changeset 138 86d1e2e6c211
parent 90 d1d07f05325a
child 139 059527f0615a
equal deleted inserted replaced
137:6fc7de0f23ba 138:86d1e2e6c211
     1 \documentclass[dvipsnames,14pt,t]{beamer}
     1 \documentclass[dvipsnames,14pt,t]{beamer}
     2 \usepackage{proof}
     2 \usepackage{proof}
     3 \usepackage{beamerthemeplainculight}
     3 \usepackage{beamerthemeplaincu}
     4 \usepackage[T1]{fontenc}
     4 %\usepackage[T1]{fontenc}
     5 \usepackage[latin1]{inputenc}
     5 %\usepackage[latin1]{inputenc}
     6 \usepackage{mathpartir}
     6 \usepackage{mathpartir}
     7 \usepackage{isabelle}
     7 \usepackage{isabelle}
     8 \usepackage{isabellesym}
     8 \usepackage{isabellesym}
     9 \usepackage[absolute,overlay]{textpos}
     9 \usepackage[absolute,overlay]{textpos}
    10 \usepackage{ifthen}
    10 \usepackage{ifthen}
    91 	tabsize=2,
    91 	tabsize=2,
    92 	showspaces=false,
    92 	showspaces=false,
    93 	showstringspaces=false}
    93 	showstringspaces=false}
    94 
    94 
    95 % beamer stuff 
    95 % beamer stuff 
    96 \renewcommand{\slidecaption}{APP 08, King's College London, 20 November 2012}
    96 \renewcommand{\slidecaption}{APP 08, King's College London, 26 November 2013}
    97 \newcommand{\dn}{\stackrel{\mbox{\scriptsize def}}{=}}% for definitions
    97 \newcommand{\dn}{\stackrel{\mbox{\scriptsize def}}{=}}% for definitions
    98 \newcommand{\bl}[1]{\textcolor{blue}{#1}}
    98 \newcommand{\bl}[1]{\textcolor{blue}{#1}}
    99 
    99 
   100 \begin{document}
   100 \begin{document}
   101 
   101 
   115 
   115 
   116 \normalsize
   116 \normalsize
   117   \begin{center}
   117   \begin{center}
   118   \begin{tabular}{ll}
   118   \begin{tabular}{ll}
   119   Email:  & christian.urban at kcl.ac.uk\\
   119   Email:  & christian.urban at kcl.ac.uk\\
   120   Of$\!$fice: & S1.27 (1st floor Strand Building)\\
   120   Office: & S1.27 (1st floor Strand Building)\\
   121   Slides: & KEATS (also homework is there)\\
   121   Slides: & KEATS (also homework is there)\\
   122   \end{tabular}
   122   \end{tabular}
   123   \end{center}
   123   \end{center}
   124 
   124 
   125 
   125 
   126 \end{frame}}
   126 \end{frame}}
   127  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%     
   127  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%     
   128 
   128 
   129 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
   129 
   130   \mode<presentation>{
   130 
   131   \begin{frame}[c]
   131 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
   132   \frametitle{Last Week}
   132 \mode<presentation>{
   133 
   133 \begin{frame}[c]
   134 Andrew Secure RPC Protocol:
   134 \frametitle{Man-in-the-Middle}
   135 \bl{$A$} and \bl{$B$} share a key private \bl{$K_{AB}$} and want to identify
   135 
   136 each other\bigskip
   136 
   137 
   137 \end{frame}}
   138  \begin{itemize}
   138 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
   139  \item \bl{$A \,\text{sends}\, B :  A, N_A$} 
   139 
   140  \item \bl{$B\,\text{sends}\, A : \{N_A, K'_{AB}\}_{K_{AB}}$}
   140 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
   141  \item \bl{$A \,\text{sends}\, B : \{N_A\}_{K'_{AB}}$}
   141 \mode<presentation>{
   142  \end{itemize}
   142 \begin{frame}[c]
   143  
   143 \frametitle{Facebook Privacy}
   144   \end{frame}}
   144 
   145   %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%    
   145 
   146     
   146 \end{frame}}
   147  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
   147 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
   148   \mode<presentation>{
       
   149   \begin{frame}[t]
       
   150   \frametitle{Protocols}
       
   151  
       
   152 \mbox{} 
       
   153   
       
   154 \begin{tabular}{l}
       
   155 {\Large \bl{$A\;\text{sends}\; B : \ldots$}}\\
       
   156 \onslide<2->{\Large \bl{$B\;\text{sends}\; A : \ldots$}}\\
       
   157 \onslide<2->{\Large \;\;\;\;\;\bl{$:$}}\bigskip
       
   158 \end{tabular}  
       
   159   
       
   160  \begin{itemize}
       
   161  \item by convention \bl{$A$}, \bl{$B$} are named principals \bl{Alice\ldots}\\
       
   162  but most likely they are programs, which just follow some instructions (they are more like roles)\bigskip
       
   163 \item<2-> indicates one ``protocol run'', or session,  which specifies some 
       
   164 order in the communication
       
   165 \item<2-> there can be several sessions in parallel (think of wifi routers) 
       
   166 \end{itemize} 
       
   167   
       
   168   \end{frame}}
       
   169   %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   170   
       
   171    %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   172   \mode<presentation>{
       
   173   \begin{frame}[c]
       
   174   \frametitle{Last Week}
       
   175 
       
   176 
       
   177 \bl{$A$} and \bl{$B$} share the key \bl{$K_{AB}$} and want to identify
       
   178 each other\bigskip
       
   179 
       
   180  \begin{itemize}
       
   181  \item \bl{$A \,\text{sends}\, B :  A, N_A$} 
       
   182  \item \bl{$B\,\text{sends}\, A : \{N_A, K'_{AB}\}_{K_{AB}}$}
       
   183  \item \bl{$A \,\text{sends}\, B : \{N_A\}_{K'_{AB}}$}
       
   184  \end{itemize}
       
   185   \end{frame}}
       
   186   %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%      
       
   187      
       
   188  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   189   \mode<presentation>{
       
   190   \begin{frame}[c]
       
   191   \frametitle{Defeating Challenge-Response}
       
   192 
       
   193 \noindent
       
   194 A \alert{reflection attack}: an intruder \bl{$I$} impersonates \bl{$B$}.
       
   195 
       
   196 \begin{center}
       
   197 \begin{tabular}{@{\hspace{-7mm}}c@{\hspace{1mm}}c@{}}
       
   198 \begin{tabular}{@{}l@{}}
       
   199 \onslide<1->{\bl{$A \,\text{sends}\, I :  A, N_A$}}\\ 
       
   200 \onslide<4->{\bl{$I \,\text{sends}\, A :  \{N_A,\!K'_{\!AB}\}_{K_{\!AB}}$}}\\ 
       
   201 \onslide<5->{\bl{$A \,\text{sends}\, I : \{N_A\}_{K'_{AB}}$}}\\
       
   202 \end{tabular}
       
   203 &
       
   204 \begin{tabular}{@{}l@{}}
       
   205 \onslide<2->{\bl{$I \,\text{sends}\, A :  B, N_A$}}\\ 
       
   206 \onslide<3->{\bl{$A \,\text{sends}\, I :  \{N_A,\!K'_{\!AB}\}_{K_{\!AB}}$}}\\ 
       
   207 \onslide<6->{\bl{$I \,\text{sends}\, A : \{N_A\}_{K'_{AB}}$}}\\
       
   208 \end{tabular}
       
   209 \end{tabular}
       
   210 \end{center}\bigskip
       
   211 
       
   212 \onslide<7->{Sounds stupid: ``\ldots answering a question with a counter question''\medskip\\
       
   213 was originally developed at CMU for terminals to connect to 
       
   214 workstations (e.g., file servers)}
       
   215 
       
   216   \end{frame}}
       
   217  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%         
       
   218 
       
   219 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   220 \mode<presentation>{
       
   221 \begin{frame}[c]
       
   222 \frametitle{Identify Friend or Foe}
       
   223 
       
   224 \begin{center}
       
   225 \onslide<3->{\mbox{}\hspace{3.4cm}\includegraphics[scale=0.55]{pics/MigInMiddle.jpg}}
       
   226 \end{center}
       
   227 
       
   228 \begin{textblock}{6}(0.3,2)
       
   229 \onslide<2->{
       
   230 198?: war between Angola (supported by Cuba)
       
   231 and Namibia (supported by SA)}
       
   232 \end{textblock}
       
   233 
       
   234 \begin{textblock}{3}(12.5,4.6)
       
   235   \onslide<3->{
       
   236   \begin{tikzpicture}
       
   237   \node at (0,0) [single arrow, fill=red,text=white, rotate=-50, shape border rotate=180]{``bystander''};
       
   238   \end{tikzpicture}}
       
   239   \end{textblock}
       
   240 
       
   241 \begin{textblock}{3}(10.9,10)
       
   242   \onslide<3->{
       
   243   \begin{tikzpicture}
       
   244   \node at (0,0) [single arrow, fill=red,text=white, rotate=-40, shape border rotate=180]{attacker};
       
   245   \end{tikzpicture}}
       
   246   \end{textblock}
       
   247   
       
   248 \only<4->{
       
   249 \begin{textblock}{6}(0.3,9)
       
   250 being outsmarted by Angola/Cuba
       
   251 ended SA involvement (?)
       
   252 \end{textblock}}
       
   253 \only<5->{
       
   254 \begin{textblock}{6}(0.3,13)
       
   255 IFF opened up a nice side-channel attack
       
   256 \end{textblock}}
       
   257 \end{frame}}
       
   258 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   259 
       
   260   %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   261   \mode<presentation>{
       
   262   \begin{frame}[c]
       
   263   \frametitle{Encryption to the Rescue?}
       
   264 
       
   265 
       
   266  \begin{itemize}
       
   267  \item \bl{$A \,\text{sends}\, B :  \{A, N_A\}_{K_{AB}}$}\hspace{1cm} encrypted\bigskip 
       
   268  \item \bl{$B\,\text{sends}\, A : \{N_A, K'_{AB}\}_{K_{AB}}$}\bigskip
       
   269  \item \bl{$A \,\text{sends}\, B : \{N_A\}_{K'_{AB}}$}\bigskip
       
   270  \end{itemize}\pause
       
   271  
       
   272 means you need to send separate ``Hello'' signals (bad), or worse 
       
   273 share a single key between many entities
       
   274 \end{frame}}
       
   275 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%      
       
   276 
       
   277 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   278 \mode<presentation>{
       
   279 \begin{frame}[c]
       
   280 \frametitle{Protocol Attacks}
       
   281 
       
   282 \begin{itemize}
       
   283 \item replay attacks
       
   284 \item reflection attacks
       
   285 \item man-in-the-middle attacks
       
   286 \item timing attacks
       
   287 \item parallel session attacks
       
   288 \item binding attacks (public key protocols)
       
   289 \item changing environment / changing assumptions\bigskip
       
   290 
       
   291 \item (social engineering attacks)
       
   292 \end{itemize}
       
   293 \end{frame}}
       
   294 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   295   
       
   296 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   297 \mode<presentation>{
       
   298 \begin{frame}[c]
       
   299 \frametitle{Replay Attacks}
       
   300 
       
   301 Schroeder-Needham protocol: exchange of a symmetric key with a trusted 3rd-party \bl{$S$}: 
       
   302 
       
   303 \begin{center}
       
   304 \begin{tabular}{r@ {\hspace{1mm}}l}
       
   305 \bl{$A \rightarrow S :$} & \bl{$A, B, N_A$}\\
       
   306 \bl{$S \rightarrow A :$} & \bl{$\{N_A, B, K_{AB},\{K_{AB}, A\}_{K_{BS}} \}_{K_{AS}}$}\\
       
   307 \bl{$A \rightarrow B :$} & \bl{$\{K_{AB}, A\}_{K_{BS}} $}\\
       
   308 \bl{$B \rightarrow A :$} & \bl{$\{N_B\}_{K_{AB}}$}\\
       
   309 \bl{$A \rightarrow B :$} & \bl{$\{N_B-1\}_{K_{AB}}$}\\
       
   310 \end{tabular}
       
   311 \end{center}\bigskip\pause
       
   312 
       
   313 at the end of the protocol both \bl{$A$} and \bl{$B$} should be in the possession of the secret key
       
   314 \bl{$K_{AB}$} and know that the other principal has the key
       
   315 
       
   316 \end{frame}}
       
   317 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   318 
       
   319   
       
   320 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   321 \mode<presentation>{
       
   322 \begin{frame}[c]
       
   323 \frametitle{Nonces}
       
   324 
       
   325 \begin{enumerate}
       
   326 \item I generate a nonce (random number) and send it to you encrypted with a key we share
       
   327 \item you increase it by one, encrypt it under a key I know and send
       
   328 it back to me
       
   329 \end{enumerate}
       
   330 
       
   331 
       
   332 I can infer:
       
   333 
       
   334 \begin{itemize}
       
   335 \item you must have received my message
       
   336 \item you could only have generated your answer after I send you my initial
       
   337 message
       
   338 \item if only you and me know the key, the message must have come from you
       
   339 \end{itemize}
       
   340 
       
   341 \end{frame}}
       
   342 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   343 
       
   344 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   345 \mode<presentation>{
       
   346 \begin{frame}[c]
       
   347 
       
   348 \begin{center}
       
   349 \begin{tabular}{l}
       
   350 \bl{$A \rightarrow S :$} \bl{$A, B, N_A$}\\
       
   351 \bl{$S \rightarrow A :$} \bl{$\{N_A, B, K_{AB},\{K_{AB}, A\}_{K_{BS}} \}_{K_{AS}}$}\\
       
   352 \bl{$A \rightarrow B :$} \bl{$\{K_{AB}, A\}_{K_{BS}} $}\\
       
   353 \bl{$B \rightarrow A :$} \bl{$\{N_B\}_{K_{AB}}$}\\
       
   354 \bl{$A \rightarrow B :$} \bl{$\{N_B-1\}_{K_{AB}}$}\pause\\
       
   355 \hspace{5cm}compromise \bl{$K_{AB}$}\pause\\
       
   356 \bl{$A \rightarrow S :$} \bl{$A, B, N'_A$}\\
       
   357 \bl{$S \rightarrow A :$} \bl{$\{N'_A, B, K'_{AB},\{K'_{AB}, A\}_{K_{BS}} \}_{K_{AS}}$}\pause\\
       
   358 \bl{$I(A) \rightarrow B :$} \bl{$\{K_{AB}, A\}_{K_{BS}} $}\hspace{0.5cm} replay of older run\pause\\
       
   359 \bl{$B \rightarrow I(A) :$} \bl{$\{N'_B\}_{K_{AB}}$}\\
       
   360 \bl{$I(A) \rightarrow B :$} \bl{$\{N'_B-1\}_{K_{AB}}$}\
       
   361 \end{tabular}
       
   362 \end{center}\pause
       
   363 
       
   364 \bl{$B$} believes it is following the correct protocol,
       
   365 intruder \bl{$I$} can form the correct response because it knows \bl{$K_{AB}$} and
       
   366 talks to \bl{$B$} masquerading as \bl{$A$}
       
   367 \end{frame}}
       
   368 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   369 
       
   370 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   371 \mode<presentation>{
       
   372 \begin{frame}[c]
       
   373 
       
   374 \begin{center}
       
   375 \includegraphics[scale=0.5]{pics/dogs.jpg}
       
   376 \end{center}
       
   377 
       
   378 \end{frame}}
       
   379 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   380 
       
   381 
       
   382 
       
   383 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   384 \mode<presentation>{
       
   385 \begin{frame}[c]
       
   386 \frametitle{Replay Attacks}
       
   387 
       
   388 Andrew Secure RPC protocol: exchanging a new key
       
   389 between \bl{$A$} and \bl{$B$}
       
   390 
       
   391 \begin{center}
       
   392 \begin{tabular}{l}
       
   393 \bl{$A \rightarrow B :$} \bl{$A, \{N_A\}_{K_{AB}}$}\\
       
   394 \bl{$B \rightarrow A :$} \bl{$\{N_A+1, N_B\}_{K_{AB}}$}\\
       
   395 \bl{$A \rightarrow B :$} \bl{$\{N_B+1\}_{K_{AB}}$}\\
       
   396 \bl{$B \rightarrow A :$} \bl{$\{K^{new}_{AB}, N^{new}_B\}_{K_{AB}}$}\\
       
   397 \end{tabular}
       
   398 \end{center}\bigskip\pause
       
   399 
       
   400 Assume nonces are represented as bit-sequences of the same length as keys
       
   401 \begin{center}
       
   402 \begin{tabular}{@{}l@{}}
       
   403 \bl{$A \rightarrow B :$} \bl{$A, \{N_A\}_{K_{AB}}$}\\
       
   404 \bl{$B \rightarrow A :$} \bl{$\{N_A+1, N_B\}_{K_{AB}}$}\\
       
   405 \bl{$A \rightarrow I(B) :$} \bl{$\{N_B+1\}_{K_{AB}}$}\hspace{0.5mm}intercepts\\
       
   406 \bl{$I(B) \rightarrow A :$} \bl{$\{N_A+1, N_B\}_{K_{AB}}$}\hspace{0.5mm}resend 2nd msg\\
       
   407 \end{tabular}
       
   408 \end{center}
       
   409 \end{frame}}
       
   410 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   411 
       
   412 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   413 \mode<presentation>{
       
   414 \begin{frame}[c]
       
   415 \frametitle{Time-Stamps}
       
   416 
       
   417 The Schroeder-Needham protocol can be fixed by including a time-stamp (e.g., in Kerberos):
       
   418 
       
   419 \begin{center}
       
   420 \begin{tabular}{r@ {\hspace{1mm}}l}
       
   421 \bl{$A \rightarrow S :$} & \bl{$A, B, N_A$}\\
       
   422 \bl{$S \rightarrow A :$} & \bl{$\{N_A, B, K_{AB},\{K_{AB}, A, T_S\}_{K_{BS}} \}_{K_{AS}}$}\\
       
   423 \bl{$A \rightarrow B :$} & \bl{$\{K_{AB}, A, T_S\}_{K_{BS}} $}\\
       
   424 \bl{$B \rightarrow A :$} & \bl{$\{N_B\}_{K_{AB}}$}\\
       
   425 \bl{$A \rightarrow B :$} & \bl{$\{N_B-1\}_{K_{AB}}$}\\
       
   426 \end{tabular}
       
   427 \end{center}\bigskip\pause
       
   428 
       
   429 but nothing is for free: then you need to synchronise time and possibly become a victim to
       
   430 timing attacks
       
   431 
       
   432 \end{frame}}
       
   433 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   434 
       
   435 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   436 \mode<presentation>{
       
   437 \begin{frame}[c]
       
   438 
       
   439 It can also be fixed by including another nonce:
       
   440 
       
   441 \begin{center}
       
   442 \begin{tabular}{r@ {\hspace{1mm}}l}
       
   443 \bl{$A \rightarrow B :$} & \bl{$A$}\\
       
   444 \bl{$B \rightarrow A :$} & \bl{$\{A, N_B\}_{K_{BS}}$}\\
       
   445 \bl{$A \rightarrow S :$} & \bl{$A, B, N_A, \{A, N_B\}_{K_{BS}}$}\\
       
   446 \bl{$S \rightarrow A :$} & \bl{$\{N_A, B, K_{AB},\{K_{AB}, A, N_B\}_{K_{BS}} \}_{K_{AS}}$}\\
       
   447 \bl{$A \rightarrow B :$} & \bl{$\{K_{AB}, A, N_B\}_{K_{BS}} $}\\
       
   448 \bl{$B \rightarrow A :$} & \bl{$\{N_B\}_{K_{AB}}$}\\
       
   449 \bl{$A \rightarrow B :$} & \bl{$\{N_B-1\}_{K_{AB}}$}\\
       
   450 \end{tabular}
       
   451 \end{center}\bigskip\pause
       
   452 
       
   453 but nothing is for free: then you need to synchronise time and possibly become victim to
       
   454 timing attacks
       
   455 
       
   456 \end{frame}}
       
   457 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   458 
       
   459 
       
   460 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   461 \mode<presentation>{
       
   462 \begin{frame}[c]
       
   463 \frametitle{Binding Attacks}
       
   464 
       
   465 with public-private keys it is important that the public key is \alert{bound} 
       
   466 to the right owner (verified by a certification authority \bl{$CA$})
       
   467 
       
   468 \begin{center}
       
   469 \begin{tabular}{l}
       
   470 \bl{$A \rightarrow CA :$} \bl{$A, B, N_A$}\\
       
   471 \bl{$CA \rightarrow A :$} \bl{$CA, \{CA, A, N_A, K^{pub}_{B}\}_{K^{pub}_{A}}$}\\
       
   472 \end{tabular}
       
   473 \end{center}\bigskip
       
   474 
       
   475 \bl{$A$} knows \bl{$K^{priv}_A$} and can verify the message came from \bl{$CA$}
       
   476 in response to \bl{$A$}'s message and trusts \bl{$K^{pub}_{B}$} is \bl{$B$}'s public key
       
   477 
       
   478 
       
   479 \end{frame}}
       
   480 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   481 
       
   482 
       
   483 
       
   484 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   485 \mode<presentation>{
       
   486 \begin{frame}[c]
       
   487 \frametitle{Binding Attacks}
       
   488 
       
   489 \begin{center}
       
   490 \begin{tabular}{l}
       
   491 \bl{$A \rightarrow I(CA) :$} \bl{$A, B, N_A$}\\
       
   492 \bl{$I(A) \rightarrow CA :$} \bl{$A, I, N_A$}\\
       
   493 \bl{$CA \rightarrow I(A) :$} \bl{$CA, \{CA, A, N_A, K^{pub}_{I}\}_{K^{pub}_{A}}$}\\
       
   494 \bl{$I(CA) \rightarrow A :$} \bl{$CA, \{CA, A, N_A, K^{pub}_{I}\}_{K^{pub}_{A}}$}\\
       
   495 \end{tabular}
       
   496 \end{center}\pause
       
   497 
       
   498 \bl{$A$} now encrypts messages for \bl{$B$} with the public key of \bl{$I$}
       
   499 (which happily decrypts them with its private key)
       
   500 
       
   501 \end{frame}}
       
   502 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   503 
       
   504 
       
   505 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   506 \mode<presentation>{
       
   507 \begin{frame}[c]
       
   508 
       
   509 There are plenty of other protocols and attacks. This could go on ``forever''.\pause\bigskip
       
   510 
       
   511 We look here on one more kind of attacks that are because of a changing environment.
       
   512 
       
   513 \end{frame}}
       
   514 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   515 
       
   516 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   517 \mode<presentation>{
       
   518 \begin{frame}[t]
       
   519 \frametitle{Changing Environment Attacks}
       
   520 
       
   521 \begin{itemize}
       
   522 \item all protocols rely on some assumptions about the environment
       
   523 (e.g., cryptographic keys cannot be broken)\bigskip\pause
       
   524 \end{itemize}
       
   525 
       
   526 \only<2>{
       
   527 \begin{itemize}
       
   528 \item in the ``good olden days'' (1960/70) rail transport was cheap, so fraud was not
       
   529 worthwhile
       
   530 \end{itemize}}
       
   531 
       
   532 \only<3>{
       
   533 \begin{itemize}
       
   534 \item when it got expensive, some people bought cheaper monthly tickets for a suburban 
       
   535 station and a nearby one, and one for the destination and a nearby one
       
   536 \item a large investment later all barriers were automatic and tickets could record state
       
   537 \end{itemize}}
       
   538 
       
   539 \only<4>{
       
   540 \begin{itemize}
       
   541 \item but suddenly the environment changed: rail transport got privatised creating many 
       
   542 competing companies
       
   543 potentially cheating each other
       
   544 \item revenue from monthly tickets was distributed according to a formula involving where the ticket was bought\ldots
       
   545 \end{itemize}}
       
   546 
       
   547 \only<5>{
       
   548 \begin{itemize}
       
   549 \item apart from bad outsiders (passengers), you also had bad insiders (rail companies)
       
   550 \item chaos and litigation ensued
       
   551 \end{itemize}}
       
   552 
       
   553 \end{frame}}
       
   554 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   555 
       
   556 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   557 \mode<presentation>{
       
   558 \begin{frame}[c]
       
   559 
       
   560 A Man-in-the-middle attack in real life:
       
   561 
       
   562 \begin{itemize}
       
   563 \item the card only says yes or no to the terminal if the PIN is correct
       
   564 \item trick the card in thinking transaction is verified by signature
       
   565 \item trick the terminal in thinking the transaction was verified by PIN
       
   566 \end{itemize}
       
   567 
       
   568 \begin{minipage}{1.1\textwidth}
       
   569 \begin{center}
       
   570 \mbox{}\hspace{-6mm}\includegraphics[scale=0.5]{pics/chip-attack.png}
       
   571 \includegraphics[scale=0.3]{pics/chipnpinflaw.png}
       
   572 \end{center}
       
   573 \end{minipage}
       
   574 
       
   575 \end{frame}}
       
   576 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   577 
       
   578 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   579 \mode<presentation>{
       
   580 \begin{frame}[c]
       
   581 \frametitle{Problems with EMV}
       
   582 
       
   583 \begin{itemize}
       
   584 \item it is a wrapper for many protocols
       
   585 \item specification by consensus (resulted unmanageable complexity)
       
   586 \item its specification is 700 pages in English plus 2000+ pages for testing, additionally some 
       
   587 further parts are secret
       
   588 \item other attacks have been found
       
   589 
       
   590 \item one solution might be to require always online verification of the PIN with the bank
       
   591 \end{itemize}
       
   592 
       
   593 \end{frame}}
       
   594 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   595 
       
   596 
       
   597 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   598 \mode<presentation>{
       
   599 \begin{frame}[c]
       
   600 \frametitle{Problems with WEP (Wifi)}
       
   601 
       
   602 \begin{itemize}
       
   603 \item a standard ratified in 1999
       
   604 \item the protocol was designed by a committee not including cryptographers
       
   605 \item it used the RC4 encryption algorithm which is a stream cipher requiring a unique nonce
       
   606 \item WEP did not allocate enough bits for the nonce
       
   607 \item for authenticating packets it used CRC checksum which can be easily broken
       
   608 \item the network password was used to directly encrypt packages (instead of a key negotiation protocol)\bigskip
       
   609 \item encryption was turned of by default
       
   610 \end{itemize}
       
   611 
       
   612 \end{frame}}
       
   613 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   614 
       
   615 
       
   616 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   617 \mode<presentation>{
       
   618 \begin{frame}[c]
       
   619 \frametitle{Protocols are Difficult}
       
   620 
       
   621 \begin{itemize}
       
   622 \item even the systems designed by experts regularly fail\medskip
       
   623 \item try to make everything explicit (you need to authenticate all data you might rely on)\medskip
       
   624 \item the one who can fix a system should also be liable for the losses\medskip
       
   625 \item cryptography is often not {\bf the} answer\bigskip\bigskip  
       
   626 \end{itemize}
       
   627 
       
   628 logic is one way protocols are studied in academia
       
   629 (you can use computers to search for attacks)
       
   630 
       
   631 \end{frame}}
       
   632 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   633 
       
   634 
       
   635 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   636 \mode<presentation>{
       
   637 \begin{frame}[c]
       
   638 \frametitle{Public-Key Infrastructure}
       
   639 
       
   640 \begin{itemize}
       
   641 \item the idea is to have a certificate authority (CA)
       
   642 \item you go to the CA to identify yourself
       
   643 \item CA: ``I, the CA, have verified that public key \bl{$P^{pub}_{Bob}$} belongs to Bob''\bigskip
       
   644 \item CA must be trusted by everybody
       
   645 \item What happens if CA issues a false certificate? Who pays in case of loss? (VeriSign 
       
   646 explicitly limits liability to \$100.)
       
   647 \end{itemize}
       
   648 
       
   649 \end{frame}}
       
   650 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   651 
       
   652 
       
   653 
   148 
   654 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
   149 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
   655 \mode<presentation>{
   150 \mode<presentation>{
   656 \begin{frame}[c]
   151 \begin{frame}[c]
   657 \frametitle{Privacy, Anonymity et al}
   152 \frametitle{Privacy, Anonymity et al}
   735 \end{textblock}
   230 \end{textblock}
   736 
   231 
   737 \end{frame}}
   232 \end{frame}}
   738 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
   233 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
   739 
   234 
       
   235 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   236 \mode<presentation>{
       
   237 \begin{frame}[t]
       
   238 \frametitle{Privacy}
       
   239 
       
   240 \begin{minipage}{1.05\textwidth}
       
   241 \begin{itemize}
       
   242 \item we \alert{do} want that government data is made public (free maps for example)
       
   243 \item we \alert{do not} want that medical data becomes public (similarly tax data, school 
       
   244 records, job offers)\bigskip
       
   245 \item personal information can potentially lead to fraud 
       
   246 (identity theft)
       
   247 \end{itemize}\pause
       
   248 
       
   249 {\bf ``The reality'':}
       
   250 \only<2>{\begin{itemize}
       
   251 \item London Health Programmes lost in June last year unencrypted details of more than 8 million people
       
   252 (no names, but postcodes and details such as gender, age and ethnic origin)
       
   253 \end{itemize}}
       
   254 \only<3>{\begin{itemize}
       
   255 \item also in June last year, Sony got hacked: over 1M users' personal information, including passwords, email addresses, home addresses, dates of birth, and all Sony opt-in data associated with their accounts.
       
   256 \end{itemize}}
       
   257 \end{minipage}
       
   258 
       
   259 \end{frame}}
       
   260 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   261 
       
   262    
       
   263 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   264 \mode<presentation>{
       
   265 \begin{frame}[c]
       
   266 \frametitle{Privacy and Big Data}
       
   267 
       
   268 Selected sources of ``Big Data'':\smallskip{}
       
   269 
       
   270 \begin{itemize}
       
   271 \item Facebook 
       
   272 \begin{itemize}
       
   273 \item 40+ Billion photos (100 PB)
       
   274 \item 6 Billion messages daily (5 - 10 TB)
       
   275 \item 900 Million users  
       
   276 \end{itemize}
       
   277 \item Common Crawl
       
   278 \begin{itemize}
       
   279 \item covers 3.8 Billion webpages (2012 dataset)
       
   280 \item 50 TB of data
       
   281 \end{itemize}
       
   282 \item Google
       
   283 \begin{itemize}
       
   284 \item 20 PB daily (2008)
       
   285 \end{itemize}
       
   286 \item Twitter
       
   287 \begin{itemize}
       
   288 \item 7 Million users in the UK
       
   289 \item a company called Datasift is allowed to mine all tweets since 2010
       
   290 \item they charge 10k per month for other companies to target advertisement
       
   291 \end{itemize}
       
   292 \end{itemize}\pause
       
   293 
       
   294 
       
   295 \end{frame}}
       
   296 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   297 
       
   298 
       
   299 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   300 \mode<presentation>{
       
   301 \begin{frame}[c]
       
   302 \frametitle{Cookies\ldots}
       
   303 
       
   304 ``We have published a new cookie policy. It explains what cookies are 
       
   305 and how we use them on our site. To learn more about cookies and 
       
   306 their benefits, please view our cookie policy.\medskip
       
   307 
       
   308 If you'd like to disable cookies on this device, please view our information 
       
   309 pages on 'How to manage cookies'. Please be aware that parts of the 
       
   310 site will not function correctly if you disable cookies. \medskip
       
   311 
       
   312 By closing this 
       
   313 message, you consent to our use of cookies on this device in accordance 
       
   314 with our cookie policy unless you have disabled them.''
       
   315 
       
   316 
       
   317 \end{frame}}
       
   318 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   319 
       
   320 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   321 \mode<presentation>{
       
   322 \begin{frame}[c]
       
   323 \frametitle{Scare Tactics}
       
   324 
       
   325 The actual policy reads:\bigskip
       
   326 
       
   327 ``As we explain in our Cookie Policy, cookies help you to get the most 
       
   328 out of our websites.\medskip
       
   329 
       
   330 If you do disable our cookies you may find that certain sections of our 
       
   331 website do not work. For example, you may have difficulties logging in 
       
   332 or viewing articles.''
       
   333 
       
   334 
       
   335 
       
   336 
       
   337 \end{frame}}
       
   338 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   339 
       
   340 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   341 \mode<presentation>{
       
   342 \begin{frame}[c]
       
   343 \frametitle{Netflix Prize}
       
   344 
       
   345 Anonymity is \alert{necessary} for privacy, but \alert{not} enough!\bigskip
       
   346 
       
   347 \begin{itemize}
       
   348 \item Netflix offered in 2006 (and every year until 2010) a 1 Mio \$ prize for improving their movie rating algorithm
       
   349 \item dataset contained 10\% of all Netflix users (appr.~500K)
       
   350 \item names were removed, but included numerical ratings as well as times of rating
       
   351 \item some information was \alert{perturbed} (i.e., slightly modified)
       
   352 \end{itemize}
       
   353 
       
   354 \hfill{\bf\alert{All OK?}}
       
   355 
       
   356 \end{frame}}
       
   357 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   358 
       
   359 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   360 \mode<presentation>{
       
   361 \begin{frame}[c]
       
   362 \frametitle{Re-identification Attack}
       
   363 
       
   364 Two researchers analysed the data: 
       
   365 
       
   366 \begin{itemize}
       
   367 \item with 8 ratings (2 of them can be wrong) and corresponding dates that can have a margin 14-day error, 98\% of the
       
   368 records can be identified
       
   369 \item for 68\% only two ratings and dates are sufficient (for movie ratings outside the top 500)\bigskip\pause
       
   370 \item they took 50 samples from IMDb (where people can reveal their identity)
       
   371 \item 2 of them uniquely identified entries in the Netflix database (either by movie rating or by dates)
       
   372 \end{itemize}
       
   373 
       
   374 \end{frame}}
       
   375 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   376 
       
   377 
       
   378 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   379 \mode<presentation>{
       
   380 \begin{frame}[c]
       
   381 \frametitle{}
       
   382 
       
   383 \begin{itemize}
       
   384 \item Birth data, postcode and gender (unique for\\ 87\% of the US population)
       
   385 \item Preferences in movies (99\% of 500K for 8 ratings)
       
   386 \end{itemize}\bigskip
       
   387 
       
   388 Therefore best practices / or even law (HIPAA, EU): 
       
   389 
       
   390 \begin{itemize}
       
   391 \item only year dates (age group for 90 years or over), 
       
   392 \item no postcodes (sector data is OK, similarly in the US)\\
       
   393 \textcolor{gray}{no names, addresses, account numbers, licence plates}
       
   394 \item disclosure information needs to be retained for 5 years
       
   395 \end{itemize}
       
   396 
       
   397 \end{frame}}
       
   398 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   399 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   400 \mode<presentation>{
       
   401 \begin{frame}<2>[c]
       
   402 \frametitle{How to Safely Disclose Information?}
       
   403 
       
   404 \only<1>{
       
   405 \begin{itemize}
       
   406 \item Assume you make a survey of 100 randomly chosen people.
       
   407 \item Say 99\% of the surveyed people in the 10 - 40 age group have seen the
       
   408 Gangnam video on youtube.\bigskip
       
   409 
       
   410 \item What can you infer about the rest of the population? 
       
   411 \end{itemize}}
       
   412 \only<2>{
       
   413 \begin{itemize}
       
   414 \item Is it possible to re-identify data later, if more data is released. \bigskip\bigskip\pause
       
   415 
       
   416 \item Not even releasing only  aggregate information prevents re-identification attacks.
       
   417 (GWAS was a public database of gene-frequency studies linked to diseases;
       
   418 you only needed partial DNA information  in order
       
   419 to identify whether an individual was part of the study --- DB closed in 2008) 
       
   420 \end{itemize}}
       
   421 
       
   422 \end{frame}}
       
   423 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   424      
       
   425 
       
   426 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   427 \mode<presentation>{
       
   428 \begin{frame}[c]
       
   429 \frametitle{Differential Privacy}
       
   430 
       
   431 \begin{center}
       
   432 User\;\;\;\;    
       
   433 \begin{tabular}{c}
       
   434 tell me \bl{$f(x)$} $\Rightarrow$\\
       
   435 $\Leftarrow$ \bl{$f(x) + \text{noise}$}
       
   436 \end{tabular}
       
   437 \;\;\;\;\begin{tabular}{@{}c}
       
   438 Database\\
       
   439 \bl{$x_1, \ldots, x_n$}
       
   440 \end{tabular}
       
   441 \end{center}
       
   442 
       
   443 
       
   444 \begin{itemize}
       
   445 \item \bl{$f(x)$} can be released, if \bl{$f$} is insensitive to
       
   446 individual entries  \bl{$x_1, \ldots, x_n$}\\
       
   447 \item Intuition: whatever is learned from the dataset would be learned regardless of whether
       
   448 \bl{$x_i$} participates\bigskip\pause 
       
   449 
       
   450 \item Noised needed in order to prevent queries:\\ Christian's salary $=$ 
       
   451 \begin{center}
       
   452 \bl{\large$\Sigma$} all staff $-$  \bl{\large$\Sigma$} all staff $\backslash$ Christian
       
   453 \end{center} 
       
   454 \end{itemize}
       
   455 
       
   456 \end{frame}}
       
   457 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   458 
       
   459 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   460 \mode<presentation>{
       
   461 \begin{frame}[c]
       
   462 \frametitle{Adding Noise}
       
   463 
       
   464 Adding noise is not as trivial as one would wish:
       
   465 
       
   466 \begin{itemize}
       
   467 \item If I ask how many of three have seen the Gangnam video and get a result
       
   468 as follows 
       
   469 
       
   470 \begin{center}
       
   471 \begin{tabular}{l|c}
       
   472 Alice & yes\\
       
   473 Bob & no\\
       
   474 Charlie & yes\\
       
   475 \end{tabular}
       
   476 \end{center}
       
   477 
       
   478 then I have to add a noise of \bl{$1$}. So answers would be in the
       
   479 range of \bl{$1$} to \bl{$3$}
       
   480 
       
   481 \bigskip
       
   482 \item But if I ask five questions for all the dataset (has seen Gangnam video, is male, below 30, \ldots),
       
   483 then one individual can change the dataset by \bl{$5$}
       
   484 \end{itemize}
       
   485 
       
   486 \end{frame}}
       
   487 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   488 
       
   489 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   490 \mode<presentation>{
       
   491 \begin{frame}[t]
       
   492 \frametitle{\begin{tabular}{@{}c@{}}Tor\end{tabular}}
       
   493 
       
   494 \begin{itemize}
       
   495 \item initially developed by US Navy Labs, but then opened up to the world 
       
   496 \item network of proxy nodes
       
   497 \item a Tor client establishes a ``random'' path to the destination server (you cannot trace back where the information came from)\bigskip\pause
       
   498 \end{itemize}
       
   499 
       
   500 \only<2>{
       
   501 \begin{itemize}
       
   502 \item malicious exit node attack: someone set up 5 Tor exit nodes and monitored the traffic:
       
   503 \begin{itemize}
       
   504 \item a number of logons and passwords used by embassies (Usbekistan `s1e7u0l7c', while
       
   505 Tunesia `Tunesia' and India `1234')
       
   506 \end{itemize}
       
   507 \end{itemize}}
       
   508 \only<3>{
       
   509 \begin{itemize}
       
   510 \item bad apple attack: if you have one insecure application, your IP can be tracked through Tor
       
   511 \begin{itemize}
       
   512 \item background: 40\% of traffic on Tor is generated by BitTorrent
       
   513 \end{itemize}
       
   514 \end{itemize}}
       
   515 
       
   516 
       
   517 \end{frame}}
       
   518 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   519 
       
   520 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   521 \mode<presentation>{
       
   522 \begin{frame}[t]
       
   523 \frametitle{\begin{tabular}{@{}c@{}}Skype\end{tabular}}
       
   524 
       
   525 \begin{itemize}
       
   526 \item Skype used to be known as a secure online communication (encryption cannot be disabled), 
       
   527 but \ldots\medskip
       
   528 
       
   529 \item it is impossible to verify whether crypto algorithms are correctly used, or whether  there are backdoors.\bigskip
       
   530  
       
   531 \item recently someone found out that you can reset the password of somebody else's
       
   532 account, only knowing their email address (needed to suspended the password reset feature temporarily)
       
   533 \end{itemize}
       
   534 
       
   535 
       
   536 \end{frame}}
       
   537 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   538 
       
   539 
       
   540      
       
   541 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   542 \mode<presentation>{
       
   543 \begin{frame}[c]
       
   544 \frametitle{\begin{tabular}{@{}c@{}}Take Home Point\end{tabular}}
       
   545 
       
   546 According to Ross Anderson: \bigskip
       
   547 \begin{itemize}
       
   548 \item Privacy in a big hospital is just about doable.\medskip
       
   549 \item How do you enforce privacy  in something as big as Google
       
   550 or complex as Facebook? No body knows.\bigskip
       
   551 
       
   552 Similarly, big databases imposed by government
       
   553 \end{itemize}
       
   554 
       
   555 
       
   556 \end{frame}}
       
   557 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   558 
   740 
   559 
   741 \end{document}
   560 \end{document}
   742 
   561 
   743 %%% Local Variables:  
   562 %%% Local Variables:  
   744 %%% mode: latex
   563 %%% mode: latex