slides/slides01.tex
changeset 102 8f2c3329c9b8
parent 101 b37223b88ebd
child 104 729b86eae005
equal deleted inserted replaced
101:b37223b88ebd 102:8f2c3329c9b8
   211 
   211 
   212 \begin{center}
   212 \begin{center}
   213 \includegraphics[scale=0.6]{pics/cryptographic-small.png}
   213 \includegraphics[scale=0.6]{pics/cryptographic-small.png}
   214 \end{center}
   214 \end{center}
   215 
   215 
   216 The NSA can probably not brute force magically better than the ``public''.
   216 The NSA can probably not brute-force magically better than the ``public''.
   217 \end{frame}}
   217 \end{frame}}
   218  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%     
   218  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%     
   219 
   219 
   220 
   220 
   221 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
   221 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
   227 
   227 
   228 \begin{tikzpicture}
   228 \begin{tikzpicture}
   229 \draw (0,0) node[inner sep=2mm,fill=cream, ultra thick, draw=red, rounded corners=2mm] 
   229 \draw (0,0) node[inner sep=2mm,fill=cream, ultra thick, draw=red, rounded corners=2mm] 
   230 {\normalsize\color{darkgray}
   230 {\normalsize\color{darkgray}
   231 \begin{minipage}{10cm}\raggedright\small
   231 \begin{minipage}{10cm}\raggedright\small
   232 ``Security engineers --- at least the good ones --- see the world dif$\!$ferently. 
   232 ``Security engineers --- at least the good ones --- see the world differently. 
   233 They can't walk into a store without noticing how they might shoplift. They can't 
   233 They can't walk into a store without noticing how they might shoplift. They can't 
   234 use a computer without wondering about the security vulnerabilities. They can't 
   234 use a computer without wondering about the security vulnerabilities. They can't 
   235 vote without trying to figure out how to vote twice. They just can't help it.''\\
   235 vote without trying to figure out how to vote twice. They just can't help it.''\\
   236 \hfill{}---Bruce Schneier
   236 \hfill{}---Bruce Schneier
   237 \end{minipage}};
   237 \end{minipage}};
   262 \begin{minipage}{10cm}\raggedright\small
   262 \begin{minipage}{10cm}\raggedright\small
   263 Prof.~V.~Nasty gives the following final exam question (closed books, closed notes):\bigskip
   263 Prof.~V.~Nasty gives the following final exam question (closed books, closed notes):\bigskip
   264 
   264 
   265 \noindent
   265 \noindent
   266 \begin{tabular}{@ {}l}
   266 \begin{tabular}{@ {}l}
   267 Write the first 100 digits of pi:\\
   267 Write the first 100 digits of $\pi$:\\
   268 3.\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_
   268 3.\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_
   269 \end{tabular}
   269 \end{tabular}
   270 \end{minipage}};
   270 \end{minipage}};
   271 \end{tikzpicture}
   271 \end{tikzpicture}
   272 \end{center}
   272 \end{center}
   273 
   273 
   274 How do you ``break'' this and how to defend against it?
   274 How can you cheat in this exam and how can you defend against such cheating?
   275 
   275 
   276 \end{frame}}
   276 \end{frame}}
   277 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   277 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   278 
   278 
   279 
   279 
   573 \begin{textblock}{1}(1,4)
   573 \begin{textblock}{1}(1,4)
   574 \begin{tikzpicture}
   574 \begin{tikzpicture}
   575 \draw (0,0) node[inner sep=2mm,fill=cream, ultra thick, draw=red, rounded corners=2mm] 
   575 \draw (0,0) node[inner sep=2mm,fill=cream, ultra thick, draw=red, rounded corners=2mm] 
   576 {\normalsize\color{darkgray}
   576 {\normalsize\color{darkgray}
   577 \begin{minipage}{11cm}\raggedright\footnotesize
   577 \begin{minipage}{11cm}\raggedright\footnotesize
   578 ``The Annonymous Hacker from earlier:\medskip\\
   578 The Annonymous Hacker from earlier:\medskip\\
   579 Try to use `Verified-By-Visa' and `Mastercard-Securecode' as rarely as possible. If only your CVV2 code is getting sniffed, you are not liable for any damage, because the code is physically printed and could have been stolen while you payed with your card at a store. Same applies if someone cloned your CC reading the magnetic stripe or sniffing RFID. Only losing your VBV or MCSC password can cause serious trouble.''\\
   579 ``Try to use `Verified-By-Visa' and `Mastercard-Securecode' as rarely as possible. If only your CVV2 code is getting sniffed, you are not liable for any damage, because the code is physically printed and could have been stolen while you payed with your card at a store. Same applies if someone cloned your CC reading the magnetic stripe or sniffing RFID. Only losing your VBV or MCSC password can cause serious trouble.''\\
   580 \hfill{}\textcolor{blue}{\url{goo.gl/UWluh0}}
   580 \hfill{}\textcolor{blue}{\url{goo.gl/UWluh0}}
   581 \end{minipage}};
   581 \end{minipage}};
   582 \end{tikzpicture}
   582 \end{tikzpicture}
   583 \end{textblock}}
   583 \end{textblock}}
   584 
   584 
   973   
   973   
   974 \begin{itemize}
   974 \begin{itemize}
   975 \item SHA-1 is a cryptographic hash function\\
   975 \item SHA-1 is a cryptographic hash function\\
   976 (MD5, SHA-256, SHA-512, \ldots) 
   976 (MD5, SHA-256, SHA-512, \ldots) 
   977 \item message $\rightarrow$ digest
   977 \item message $\rightarrow$ digest
   978 \item attack exists $2^{80} \rightarrow 2^{61}$ \bigskip\pause
   978 \item attacks exist: $2^{80} \rightarrow 2^{61}$ \bigskip\pause
   979 \item but dictionary attacks are very ef$\!$fective for extracting passwords (later)
   979 \item but dictionary attacks are much more effective for extracting passwords (later)
   980 \end{itemize}  
   980 \end{itemize}  
   981   
   981   
   982 \end{frame}}
   982 \end{frame}}
   983 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   983 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   984 
   984 
  1296 \end{itemize}
  1296 \end{itemize}
  1297 
  1297 
  1298 \end{frame}}
  1298 \end{frame}}
  1299 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
  1299 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
  1300 
  1300 
  1301 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  1301 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  1302 \mode<presentation>{
  1302 \mode<presentation>{
  1303 \begin{frame}[c]
  1303 \begin{frame}[c]
  1304 \frametitle{\begin{tabular}{c}Take-Home Points\end{tabular}}
  1304 \frametitle{This Course is about  Satan's Computer}
  1305 
       
  1306 \begin{itemize}
       
  1307 \item Never store passwords in plain text.\medskip
       
  1308 \item Always salt your hashes!\medskip
       
  1309 \item Use an existing algorithm; do not write your own!
       
  1310 \end{itemize}
       
  1311 
       
  1312 \end{frame}}
       
  1313 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
  1314 
       
  1315 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
  1316 \mode<presentation>{
       
  1317 \begin{frame}[c]
       
  1318 \frametitle{\begin{tabular}{c}The Security Mindset\end{tabular}}
       
  1319 
       
  1320 \begin{itemize}
       
  1321 \item How things can go wrong?
       
  1322 \item Think outside the box.
       
  1323 \end{itemize}\bigskip
       
  1324 
       
  1325 The difference between being criminal is to only \alert{\bf think} about how things can go 
       
  1326 wrong, or be very careful with attacks.
       
  1327   
       
  1328 \end{frame}}
       
  1329 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
  1330 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
  1331 \mode<presentation>{
       
  1332 \begin{frame}[c]
       
  1333 \frametitle{Satan's Computer}
       
  1334 
  1305 
  1335 Ross Anderson and Roger Needham wrote:\bigskip
  1306 Ross Anderson and Roger Needham wrote:\bigskip
  1336 
  1307 
  1337 \begin{tikzpicture}
  1308 \begin{tikzpicture}
  1338 \draw (0,0) node[inner sep=2mm,fill=cream, ultra thick, draw=red, rounded corners=2mm] 
  1309 \draw (0,0) node[inner sep=2mm,fill=cream, ultra thick, draw=red, rounded corners=2mm] 
  1360 \end{textblock}}
  1331 \end{textblock}}
  1361 
  1332 
  1362 \end{frame}}
  1333 \end{frame}}
  1363 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
  1334 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
  1364 
  1335 
       
  1336 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
  1337 \mode<presentation>{
       
  1338 \begin{frame}[c]
       
  1339 \frametitle{\begin{tabular}{c}Take-Home Points\end{tabular}}
       
  1340 
       
  1341 \begin{itemize}
       
  1342 \item Never store passwords in plain text.\medskip
       
  1343 \item Always salt your hashes!\medskip
       
  1344 \item Use an existing crypto algorithm; do not write your own!\medskip
       
  1345 \item Make the party responsible for losses, who is in the position to improve things.
       
  1346 \end{itemize}
       
  1347 
       
  1348 \end{frame}}
       
  1349 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
  1365 
  1350 
  1366 
  1351 
  1367 \end{document}
  1352 \end{document}
  1368 
  1353 
  1369 %%% Local Variables:  
  1354 %%% Local Variables: