# HG changeset patch # User Christian Urban # Date 1419990560 0 # Node ID 34a8f73b2c9434478e2f6b6b57813c1bf3dbedab # Parent 942205605c301fbcf9835fe5f23b9857961f5948 updated diff -r 942205605c30 -r 34a8f73b2c94 handouts/ho01.pdf Binary file handouts/ho01.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 handouts/ho01.tex --- a/handouts/ho01.tex Tue Dec 30 21:59:47 2014 +0000 +++ b/handouts/ho01.tex Wed Dec 31 01:49:20 2014 +0000 @@ -4,10 +4,13 @@ \lstset{language=JavaScript} + \begin{document} +\fnote{\copyright{} Christian Urban, 2014} \section*{Handout 1 (Security Engineering)} + Much of the material and inspiration in this module is taken from the works of Bruce Schneier, Ross Anderson and Alex Halderman. I think they are the world experts in the area of diff -r 942205605c30 -r 34a8f73b2c94 handouts/ho02.pdf Binary file handouts/ho02.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 handouts/ho02.tex --- a/handouts/ho02.tex Tue Dec 30 21:59:47 2014 +0000 +++ b/handouts/ho02.tex Wed Dec 31 01:49:20 2014 +0000 @@ -3,6 +3,7 @@ \usepackage{../langs} \begin{document} +\fnote{\copyright{} Christian Urban, 2014} \section*{Handout 2 (E-Voting)} diff -r 942205605c30 -r 34a8f73b2c94 handouts/ho03.pdf Binary file handouts/ho03.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 handouts/ho03.tex --- a/handouts/ho03.tex Tue Dec 30 21:59:47 2014 +0000 +++ b/handouts/ho03.tex Wed Dec 31 01:49:20 2014 +0000 @@ -5,6 +5,7 @@ \usepackage{../data} \begin{document} +\fnote{\copyright{} Christian Urban, 2014} \section*{Handout 3 (Buffer Overflow Attacks)} diff -r 942205605c30 -r 34a8f73b2c94 handouts/ho04.pdf Binary file handouts/ho04.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 handouts/ho04.tex --- a/handouts/ho04.tex Tue Dec 30 21:59:47 2014 +0000 +++ b/handouts/ho04.tex Wed Dec 31 01:49:20 2014 +0000 @@ -3,6 +3,7 @@ \usepackage{../langs} \begin{document} +\fnote{\copyright{} Christian Urban, 2014} \section*{Handout 4 (Access Control)} @@ -28,7 +29,8 @@ and e\underline{\textbf{x}}ecute. Moreover there are three user groups to which the modes apply: the owner of the file, the group the file is associated with and everybody else. -A typical permission of a file owned by \texttt{bob} might look as +A typical permission of a file owned by \texttt{bob} +being in the group \texttt{staff} might look as follows: \begin{center} @@ -41,8 +43,8 @@ \noindent For the moment let us ignore the directory bit. The Unix access rules imply that Bob will only have read access to -this file, even if he is in the group \texttt{staff} and the -group access permissions allow read and write. Similarly every +this file, even if he is in the group \texttt{staff} and this +group's access permissions allow read and write. Similarly every member in the \texttt{staff} group who is not \texttt{bob}, will only have read-write access permissions, not read-write-execute. diff -r 942205605c30 -r 34a8f73b2c94 handouts/ho05.pdf Binary file handouts/ho05.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 handouts/ho05.tex --- a/handouts/ho05.tex Tue Dec 30 21:59:47 2014 +0000 +++ b/handouts/ho05.tex Wed Dec 31 01:49:20 2014 +0000 @@ -3,6 +3,7 @@ \usepackage{../langs} \begin{document} +\fnote{\copyright{} Christian Urban, 2014} \section*{Handout 5 (Protocols)} diff -r 942205605c30 -r 34a8f73b2c94 handouts/ho06.pdf Binary file handouts/ho06.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 handouts/ho06.tex --- a/handouts/ho06.tex Tue Dec 30 21:59:47 2014 +0000 +++ b/handouts/ho06.tex Wed Dec 31 01:49:20 2014 +0000 @@ -2,6 +2,7 @@ \usepackage{../style} \begin{document} +\fnote{\copyright{} Christian Urban, 2014} \section*{Handout 6 (Zero-Knowledge Proofs)} @@ -379,9 +380,13 @@ \subsubsection*{Using Modular Arithmetic for ZKP Protocols} -Another NP-problem is to calculate discrete logarithms. It can -be used by choosing public numbers $A$, $B$, $p$, and private -$x$ such that +While information can be encoded into graph isomorphisms, it +is not the most convenient carrier of information. Clearly it +is much easier to encode information into numbers. Let us look +at zero-knowledge proofs that use numbers as secrets. For this +the underlying NP-problem is to calculate discrete logarithms. +It can be used by choosing public numbers $A$, $B$, $p$, and +private $x$ such that \begin{center} $A^x \equiv B\; mod\; p$ @@ -406,6 +411,11 @@ http://zk-ssh.cms.ac/docs/Zero_Knowledge_Prinzipien.pdf http://www.wisdom.weizmann.ac.il/~oded/PS/zk-tut02v4.ps +socialist millionares problem +http://en.wikipedia.org/wiki/Socialist_millionaire +http://twistedoakstudios.com/blog/Post3724_explain-it-like-im-five-the-socialist-millionaire-problem-and-secure-multi-party-computation + + %%% Local Variables: %%% mode: latex %%% TeX-master: t diff -r 942205605c30 -r 34a8f73b2c94 handouts/ho07.pdf Binary file handouts/ho07.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 handouts/ho07.tex --- a/handouts/ho07.tex Tue Dec 30 21:59:47 2014 +0000 +++ b/handouts/ho07.tex Wed Dec 31 01:49:20 2014 +0000 @@ -3,6 +3,7 @@ \usepackage{../graphics} \begin{document} +\fnote{\copyright{} Christian Urban, 2014} \section*{Handout 7 (Privacy)} @@ -55,7 +56,7 @@ this request, that is you. \begin{center} -\includegraphics[scale=0.17]{../pics/verizon.png} +\includegraphics[scale=0.16]{../pics/verizon.png} \end{center} \noindent How disgusting! Even worse, Verizon is not known for diff -r 942205605c30 -r 34a8f73b2c94 handouts/ho08.pdf Binary file handouts/ho08.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 handouts/ho08.tex --- a/handouts/ho08.tex Tue Dec 30 21:59:47 2014 +0000 +++ b/handouts/ho08.tex Wed Dec 31 01:49:20 2014 +0000 @@ -4,6 +4,7 @@ \usepackage{../langs} \begin{document} +\fnote{\copyright{} Christian Urban, 2014} \section*{Handout 8 (Bitcoins)} diff -r 942205605c30 -r 34a8f73b2c94 handouts/ho09.pdf Binary file handouts/ho09.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 handouts/ho09.tex --- a/handouts/ho09.tex Tue Dec 30 21:59:47 2014 +0000 +++ b/handouts/ho09.tex Wed Dec 31 01:49:20 2014 +0000 @@ -6,6 +6,7 @@ \usepackage{multicol} \begin{document} +\fnote{\copyright{} Christian Urban, 2014} \section*{Handout 9 (Static Analysis)} diff -r 942205605c30 -r 34a8f73b2c94 hws/hw01.pdf Binary file hws/hw01.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 hws/hw02.pdf Binary file hws/hw02.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 hws/hw03.pdf Binary file hws/hw03.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 hws/hw04.pdf Binary file hws/hw04.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 hws/hw05.pdf Binary file hws/hw05.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 hws/hw06.pdf Binary file hws/hw06.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 hws/hw07.pdf Binary file hws/hw07.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 hws/hw08.pdf Binary file hws/hw08.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 hws/so04.pdf Binary file hws/so04.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 progs/read2.c --- a/progs/read2.c Tue Dec 30 21:59:47 2014 +0000 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,47 +0,0 @@ -#include -#include -#include - -FILE *f; //file pointer - -//tests return errno = 13 for permission denied -void read_test(char *name) -{ - if ((f = fopen(name, "r")) == NULL) { - printf("%s is not readable, errno = %d\n", name, errno); - } else { - printf("%s is readable\n", name); fclose(f); - } -} - -void write_test(char *name) -{ - if ((f = fopen(name, "r+")) == NULL) { - printf("%s is not writable, errno = %d\n", name, errno); - } else { - printf("%s is writable\n", name); fclose(f); - } -} - -int main(int argc, char *argv[]) -{ - printf("Real UID = %d\n", getuid()); - printf("Effective UID = %d\n", geteuid()); - - read_test(argv[1]); - write_test(argv[1]); - - //lowering the access rights to the caller - if (setuid(getuid())) { - printf("could not reset setuid, errno = %d\n", errno); - return 1; - } - - printf("Real UID = %d\n", getuid()); - printf("Effective UID = %d\n", geteuid()); - - read_test(argv[1]); - write_test(argv[1]); - - return 0; -} diff -r 942205605c30 -r 34a8f73b2c94 slides/slides01.pdf Binary file slides/slides01.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 slides/slides02.pdf Binary file slides/slides02.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 slides/slides03.pdf Binary file slides/slides03.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 slides/slides04.pdf Binary file slides/slides04.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 slides/slides05.pdf Binary file slides/slides05.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 slides/slides06.pdf Binary file slides/slides06.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 slides/slides07.pdf Binary file slides/slides07.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 slides/slides08.pdf Binary file slides/slides08.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 slides/slides09.pdf Binary file slides/slides09.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 slides/slides10.pdf Binary file slides/slides10.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 slides/slides11.pdf Binary file slides/slides11.pdf has changed diff -r 942205605c30 -r 34a8f73b2c94 style.sty --- a/style.sty Tue Dec 30 21:59:47 2014 +0000 +++ b/style.sty Wed Dec 31 01:49:20 2014 +0000 @@ -26,3 +26,7 @@ \newcommand\Grid[1]{% \@tfor\z:=#1\do{\grid{\z}}} \makeatother + +\makeatletter +\def\fnote{\gdef\@thefnmark{}\@footnotetext} +\makeatother