slides/slides01.tex
changeset 526 dac7bab6cfea
parent 518 e1fcfba63a31
child 527 968ff3fb17c6
equal deleted inserted replaced
525:ae74348e5302 526:dac7bab6cfea
   528 \end{itemize}
   528 \end{itemize}
   529   
   529   
   530 \end{frame}
   530 \end{frame}
   531 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   531 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   532 
   532 
       
   533 
       
   534 
   533 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
   535 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
   534 \begin{frame}[c]
   536 \begin{frame}[c]
   535 \frametitle{Web Applications}
   537 \frametitle{Web Applications}
   536 
   538 
   537 \begin{textblock}{1}(2,5)
   539 \begin{textblock}{1}(2,5)
   731   
   733   
   732 \begin{itemize}
   734 \begin{itemize}
   733 \item SHA-1 is a cryptographic hash function\\
   735 \item SHA-1 is a cryptographic hash function\\
   734 (MD5, SHA-256, SHA-512, \ldots) 
   736 (MD5, SHA-256, SHA-512, \ldots) 
   735 \item message $\rightarrow$ digest
   737 \item message $\rightarrow$ digest
   736 \item attacks exist: $2^{80} \rightarrow 2^{61}$ \bigskip\pause
   738 \item attacks exist: $2^{80} \rightarrow 2^{61}$ (should not be used
       
   739   anymore and browsers stopped accepting SHA-1 certificates)\bigskip\pause
   737 \item but dictionary attacks are much more effective for extracting passwords (later)
   740 \item but dictionary attacks are much more effective for extracting passwords (later)
   738 \end{itemize}  
   741 \end{itemize}  
   739   
   742   
   740 \end{frame}
   743 \end{frame}
   741 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   744 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   864 Ashley Madison containing 31 million passwords, many of them 
   867 Ashley Madison containing 31 million passwords, many of them 
   865 poorly hashed
   868 poorly hashed
   866 \end{itemize}\medskip
   869 \end{itemize}\medskip
   867 
   870 
   868 \small
   871 \small
   869 (web user maintains 25 separate accounts but uses just 6.5 passwords.)
   872 (users typically maintain 25 separate accounts but use just 6.5 passwords.)
   870 
   873 
   871 \end{frame}}
   874 \end{frame}}
   872 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   875 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   873 
   876 
   874 %For instance, SHA512crypt, which is included in Mac OS X and most Unix-based operating systems, passes text through 5,000 iterations, a %hurdle that would have limited Gosney to slightly less than 2,600 guesses per second. The Bcrypt algorithm is even more computationally %expensive, in large part because it subjects text to multiple iterations of the Blowfish cipher that was deliberately modified to increase the %time required to generate a hash. PBKDF2, a function built into Microsoft's .Net software developer framework, offers similar benefits.
   877 %For instance, SHA512crypt, which is included in Mac OS X and most Unix-based operating systems, passes text through 5,000 iterations, a %hurdle that would have limited Gosney to slightly less than 2,600 guesses per second. The Bcrypt algorithm is even more computationally %expensive, in large part because it subjects text to multiple iterations of the Blowfish cipher that was deliberately modified to increase the %time required to generate a hash. PBKDF2, a function built into Microsoft's .Net software developer framework, offers similar benefits.
   935 \begin{frame}[c]
   938 \begin{frame}[c]
   936 \frametitle{This Course}
   939 \frametitle{This Course}
   937 
   940 
   938 \begin{itemize}
   941 \begin{itemize}
   939 \item electronic voting
   942 \item electronic voting
   940 \item break-ins (buffer overflows)
   943 \item buffer overflows
   941 \item access control\\ (role based, data security / data integrity)
   944 \item access control\\ (role based, data security / data integrity)
   942 \item protocols
   945 \item protocols
   943 \item zero-knowledge proofs
       
   944 \item privacy
   946 \item privacy
   945 \begin{quote}
   947 \begin{quote}
   946 Scott McNealy: \\``You have zero privacy anyway. Get over it.''
   948 Scott McNealy: \\``You have zero privacy anyway. Get over it.''
   947 \end{quote}
   949 \end{quote}
   948 \item trust, bitcoins
   950 \item trust, bitcoins
   949 \item static analysis
       
   950 \end{itemize}
   951 \end{itemize}
   951 
   952 
   952 \end{frame}
   953 \end{frame}
   953 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   954 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   954 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
   955 
   955 \begin{frame}[c]
   956 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
   956 \frametitle{Books + Homework}
   957 \begin{frame}[c]
       
   958 \frametitle{Books + Homework + Exam}
   957 
   959 
   958 \begin{itemize}
   960 \begin{itemize}
   959 \item There is no single book I am following, but
   961 \item There is no single book I am following, but
   960 
   962 
   961   \begin{center}
   963   \begin{center}
   971   
   973   
   972 \end{itemize}
   974 \end{itemize}
   973 
   975 
   974 \end{frame}
   976 \end{frame}
   975 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   977 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   978 
       
   979 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   980 \begin{frame}[c]
       
   981 \frametitle{There will be 1 Coursework}
       
   982 
       
   983 \begin{itemize}
       
   984 \item worth 10\%  
       
   985 \item released on 23 October
       
   986 \item due on 1 December  
       
   987 \end{itemize}
       
   988 
       
   989 \end{frame}
       
   990 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   991 
       
   992 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   993 \begin{frame}[c]
       
   994 \frametitle{Lecture Capture}
       
   995 
       
   996 \begin{itemize}
       
   997 \item Hope it works\ldots\medskip\pause
       
   998 \item It is important to use lecture capture wisely:
       
   999 \begin{itemize}  
       
  1000 \item Lecture recordings are a study and revision aid.
       
  1001 \item Statistically, there is a clear and direct link between attendance and
       
  1002   attainment: Students who do not attend lectures, do less well in exams.
       
  1003 \end{itemize}
       
  1004 
       
  1005 \item Attending a lecture is more than watching it online -- if you do not
       
  1006 attend, you miss out!  
       
  1007   
       
  1008 \end{itemize}
       
  1009 
       
  1010 \end{frame}
       
  1011 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
  1012 
   976 
  1013 
   977 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  1014 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
   978 \begin{frame}[c]
  1015 \begin{frame}[c]
   979 \frametitle{Further Information}
  1016 \frametitle{Further Information}
   980 
  1017