# HG changeset patch # User Christian Urban # Date 1448540890 0 # Node ID 08906f4325bb555320c50edec14d27da64eed8a6 # Parent 8bf6704fc99163856a23b97a10d6248d0beed221 updated diff -r 8bf6704fc991 -r 08906f4325bb hws/hw07.pdf Binary file hws/hw07.pdf has changed diff -r 8bf6704fc991 -r 08906f4325bb hws/hw07.tex --- a/hws/hw07.tex Thu Nov 26 11:59:38 2015 +0000 +++ b/hws/hw07.tex Thu Nov 26 12:28:10 2015 +0000 @@ -13,7 +13,7 @@ \item What is a \emph{re-identification attack}? \item Imagine you have a completely `innocent' email message, - like birthday wishes to your grandmother? Why should you + like birthday wishes to your grandmother. Why should you still encrypt this message and your grandmother take the effort to decrypt it? diff -r 8bf6704fc991 -r 08906f4325bb slides/slides11.pdf Binary file slides/slides11.pdf has changed diff -r 8bf6704fc991 -r 08906f4325bb slides/slides11.tex --- a/slides/slides11.tex Thu Nov 26 11:59:38 2015 +0000 +++ b/slides/slides11.tex Thu Nov 26 12:28:10 2015 +0000 @@ -36,7 +36,7 @@ \begin{bubble}[10cm] Imagine you have a completely innocent email message, like -birthday wishes to your grandmother? Why should you still +birthday wishes to your grandmother. Why should you still encrypt this message and your grandmother take the effort to decrypt it? \end{bubble} @@ -61,12 +61,13 @@ \footnotesize\mbox{M.C.Escher, Amazing World (from Gödel, Escher, Bach by D.Hofstadter)} \end{center} +\hfill\includegraphics[scale=0.3]{../pics/hofstadter.jpg} \end{frame} %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% \begin{frame}[c] -\frametitle{Interlock Protocol} +\frametitle{Interlock Protocols} \mbox{A Protocol between a car \bl{$C$} and a key transponder \bl{$T$}:}\bigskip @@ -475,13 +476,14 @@ \frametitle{Coming Back To\ldots} \begin{bubble}[10cm] -Imagine you have an completely innocent email message, like -birthday wishes to your grandmother? Why should you still +Imagine you have a completely innocent email message, like +birthday wishes to your grandmother. Why should you still encrypt this message and your grandmother take the effort to decrypt it? \end{bubble}\pause \begin{itemize} +\item \small Any wild guesses?\pause \item \small Bruce Schneier\\ NSA Surveillance and What To Do About It\\ @@ -503,7 +505,6 @@ Skype and everything else UK or US-made, which they can use eavesdrop on conversations without the conversants' knowledge or consent. - \end{bubble} \begin{itemize}