changeset 102 | 8f2c3329c9b8 |
parent 101 | b37223b88ebd |
child 104 | 729b86eae005 |
101:b37223b88ebd | 102:8f2c3329c9b8 |
---|---|
211 |
211 |
212 \begin{center} |
212 \begin{center} |
213 \includegraphics[scale=0.6]{pics/cryptographic-small.png} |
213 \includegraphics[scale=0.6]{pics/cryptographic-small.png} |
214 \end{center} |
214 \end{center} |
215 |
215 |
216 The NSA can probably not brute force magically better than the ``public''. |
216 The NSA can probably not brute-force magically better than the ``public''. |
217 \end{frame}} |
217 \end{frame}} |
218 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
218 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
219 |
219 |
220 |
220 |
221 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
221 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
227 |
227 |
228 \begin{tikzpicture} |
228 \begin{tikzpicture} |
229 \draw (0,0) node[inner sep=2mm,fill=cream, ultra thick, draw=red, rounded corners=2mm] |
229 \draw (0,0) node[inner sep=2mm,fill=cream, ultra thick, draw=red, rounded corners=2mm] |
230 {\normalsize\color{darkgray} |
230 {\normalsize\color{darkgray} |
231 \begin{minipage}{10cm}\raggedright\small |
231 \begin{minipage}{10cm}\raggedright\small |
232 ``Security engineers --- at least the good ones --- see the world dif$\!$ferently. |
232 ``Security engineers --- at least the good ones --- see the world differently. |
233 They can't walk into a store without noticing how they might shoplift. They can't |
233 They can't walk into a store without noticing how they might shoplift. They can't |
234 use a computer without wondering about the security vulnerabilities. They can't |
234 use a computer without wondering about the security vulnerabilities. They can't |
235 vote without trying to figure out how to vote twice. They just can't help it.''\\ |
235 vote without trying to figure out how to vote twice. They just can't help it.''\\ |
236 \hfill{}---Bruce Schneier |
236 \hfill{}---Bruce Schneier |
237 \end{minipage}}; |
237 \end{minipage}}; |
262 \begin{minipage}{10cm}\raggedright\small |
262 \begin{minipage}{10cm}\raggedright\small |
263 Prof.~V.~Nasty gives the following final exam question (closed books, closed notes):\bigskip |
263 Prof.~V.~Nasty gives the following final exam question (closed books, closed notes):\bigskip |
264 |
264 |
265 \noindent |
265 \noindent |
266 \begin{tabular}{@ {}l} |
266 \begin{tabular}{@ {}l} |
267 Write the first 100 digits of pi:\\ |
267 Write the first 100 digits of $\pi$:\\ |
268 3.\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_ |
268 3.\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_ |
269 \end{tabular} |
269 \end{tabular} |
270 \end{minipage}}; |
270 \end{minipage}}; |
271 \end{tikzpicture} |
271 \end{tikzpicture} |
272 \end{center} |
272 \end{center} |
273 |
273 |
274 How do you ``break'' this and how to defend against it? |
274 How can you cheat in this exam and how can you defend against such cheating? |
275 |
275 |
276 \end{frame}} |
276 \end{frame}} |
277 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
277 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
278 |
278 |
279 |
279 |
573 \begin{textblock}{1}(1,4) |
573 \begin{textblock}{1}(1,4) |
574 \begin{tikzpicture} |
574 \begin{tikzpicture} |
575 \draw (0,0) node[inner sep=2mm,fill=cream, ultra thick, draw=red, rounded corners=2mm] |
575 \draw (0,0) node[inner sep=2mm,fill=cream, ultra thick, draw=red, rounded corners=2mm] |
576 {\normalsize\color{darkgray} |
576 {\normalsize\color{darkgray} |
577 \begin{minipage}{11cm}\raggedright\footnotesize |
577 \begin{minipage}{11cm}\raggedright\footnotesize |
578 ``The Annonymous Hacker from earlier:\medskip\\ |
578 The Annonymous Hacker from earlier:\medskip\\ |
579 Try to use `Verified-By-Visa' and `Mastercard-Securecode' as rarely as possible. If only your CVV2 code is getting sniffed, you are not liable for any damage, because the code is physically printed and could have been stolen while you payed with your card at a store. Same applies if someone cloned your CC reading the magnetic stripe or sniffing RFID. Only losing your VBV or MCSC password can cause serious trouble.''\\ |
579 ``Try to use `Verified-By-Visa' and `Mastercard-Securecode' as rarely as possible. If only your CVV2 code is getting sniffed, you are not liable for any damage, because the code is physically printed and could have been stolen while you payed with your card at a store. Same applies if someone cloned your CC reading the magnetic stripe or sniffing RFID. Only losing your VBV or MCSC password can cause serious trouble.''\\ |
580 \hfill{}\textcolor{blue}{\url{goo.gl/UWluh0}} |
580 \hfill{}\textcolor{blue}{\url{goo.gl/UWluh0}} |
581 \end{minipage}}; |
581 \end{minipage}}; |
582 \end{tikzpicture} |
582 \end{tikzpicture} |
583 \end{textblock}} |
583 \end{textblock}} |
584 |
584 |
973 |
973 |
974 \begin{itemize} |
974 \begin{itemize} |
975 \item SHA-1 is a cryptographic hash function\\ |
975 \item SHA-1 is a cryptographic hash function\\ |
976 (MD5, SHA-256, SHA-512, \ldots) |
976 (MD5, SHA-256, SHA-512, \ldots) |
977 \item message $\rightarrow$ digest |
977 \item message $\rightarrow$ digest |
978 \item attack exists $2^{80} \rightarrow 2^{61}$ \bigskip\pause |
978 \item attacks exist: $2^{80} \rightarrow 2^{61}$ \bigskip\pause |
979 \item but dictionary attacks are very ef$\!$fective for extracting passwords (later) |
979 \item but dictionary attacks are much more effective for extracting passwords (later) |
980 \end{itemize} |
980 \end{itemize} |
981 |
981 |
982 \end{frame}} |
982 \end{frame}} |
983 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
983 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
984 |
984 |
1296 \end{itemize} |
1296 \end{itemize} |
1297 |
1297 |
1298 \end{frame}} |
1298 \end{frame}} |
1299 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
1299 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
1300 |
1300 |
1301 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
1301 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
1302 \mode<presentation>{ |
1302 \mode<presentation>{ |
1303 \begin{frame}[c] |
1303 \begin{frame}[c] |
1304 \frametitle{\begin{tabular}{c}Take-Home Points\end{tabular}} |
1304 \frametitle{This Course is about Satan's Computer} |
1305 |
|
1306 \begin{itemize} |
|
1307 \item Never store passwords in plain text.\medskip |
|
1308 \item Always salt your hashes!\medskip |
|
1309 \item Use an existing algorithm; do not write your own! |
|
1310 \end{itemize} |
|
1311 |
|
1312 \end{frame}} |
|
1313 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
1314 |
|
1315 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
1316 \mode<presentation>{ |
|
1317 \begin{frame}[c] |
|
1318 \frametitle{\begin{tabular}{c}The Security Mindset\end{tabular}} |
|
1319 |
|
1320 \begin{itemize} |
|
1321 \item How things can go wrong? |
|
1322 \item Think outside the box. |
|
1323 \end{itemize}\bigskip |
|
1324 |
|
1325 The difference between being criminal is to only \alert{\bf think} about how things can go |
|
1326 wrong, or be very careful with attacks. |
|
1327 |
|
1328 \end{frame}} |
|
1329 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
1330 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
1331 \mode<presentation>{ |
|
1332 \begin{frame}[c] |
|
1333 \frametitle{Satan's Computer} |
|
1334 |
1305 |
1335 Ross Anderson and Roger Needham wrote:\bigskip |
1306 Ross Anderson and Roger Needham wrote:\bigskip |
1336 |
1307 |
1337 \begin{tikzpicture} |
1308 \begin{tikzpicture} |
1338 \draw (0,0) node[inner sep=2mm,fill=cream, ultra thick, draw=red, rounded corners=2mm] |
1309 \draw (0,0) node[inner sep=2mm,fill=cream, ultra thick, draw=red, rounded corners=2mm] |
1360 \end{textblock}} |
1331 \end{textblock}} |
1361 |
1332 |
1362 \end{frame}} |
1333 \end{frame}} |
1363 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
1334 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
1364 |
1335 |
1336 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
1337 \mode<presentation>{ |
|
1338 \begin{frame}[c] |
|
1339 \frametitle{\begin{tabular}{c}Take-Home Points\end{tabular}} |
|
1340 |
|
1341 \begin{itemize} |
|
1342 \item Never store passwords in plain text.\medskip |
|
1343 \item Always salt your hashes!\medskip |
|
1344 \item Use an existing crypto algorithm; do not write your own!\medskip |
|
1345 \item Make the party responsible for losses, who is in the position to improve things. |
|
1346 \end{itemize} |
|
1347 |
|
1348 \end{frame}} |
|
1349 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
1365 |
1350 |
1366 |
1351 |
1367 \end{document} |
1352 \end{document} |
1368 |
1353 |
1369 %%% Local Variables: |
1354 %%% Local Variables: |