# HG changeset patch # User Christian Urban # Date 1415061694 0 # Node ID b732a63c17b8e9a196588cdd6807d8f18937450b # Parent 5616e664c0207fbae08d3f143ffb047860916c7a updated diff -r 5616e664c020 -r b732a63c17b8 slides/slides06.pdf Binary file slides/slides06.pdf has changed diff -r 5616e664c020 -r b732a63c17b8 slides/slides06.tex --- a/slides/slides06.tex Mon Nov 03 22:42:47 2014 +0000 +++ b/slides/slides06.tex Tue Nov 04 00:41:34 2014 +0000 @@ -36,10 +36,35 @@ %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% \begin{frame}[c] -\frametitle{Problems with Car Keys} +\frametitle{Problems with Key Fobs} + +\begin{columns} +\begin{column}[T]{4cm} +\includegraphics[scale=0.4]{../pics/car-standard.jpg} +\end{column} + +\begin{column}[T]{6cm} +\begin{itemize} +\item (I learned) jamming the closing + signal +\item relay signals\pause +\item use diagnostic port to program + blank keys +\end{itemize} +\end{column} +\end{columns} + +\end{frame} +%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + +%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% +\begin{frame}[c] +\frametitle{Hashes for History} + +Q: What is the hash for? \begin{center} -\includegraphics[scale=0.4]{../pics/car-standard.jpg} +\includegraphics[scale=0.4]{../pics/Dismantling_Megamos_Crypto.png} \end{center} \end{frame} @@ -86,22 +111,38 @@ \begin{frame}[c] \frametitle{Zero-Knowledge Proofs} -Two remarkable properties of \alert{Zero-Knowledge Proofs}:\bigskip +Two remarkable properties of \alert{Zero-Knowledge +Proofs}:\bigskip \begin{itemize} -\item Alice only reveals the fact that she knows a secret, not the secret itself (meaning -she can convince Bob that she knows the secret).\bigskip -\item Having been convinced, Bob cannot use the evidence in order to convince Carol -that Alice knows the secret. + +\item Alice only reveals the fact that she knows a secret, not + the secret itself (meaning she can convince Bob that she + knows the secret, but does not give it to him).\bigskip +\item Having been convinced, Bob cannot use the evidence in + order to convince Carol that Alice knows the secret. + \end{itemize} \end{frame} %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% -\mode{ +\begin{frame}[c] +\frametitle{Interactive Protocols} + +Q: How to cut a cake into two equal slices? + +\begin{center} +\includegraphics[scale=0.15]{../pics/cake.jpg} +\end{center} + +\end{frame} +%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + +%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% \begin{frame}[t] -\frametitle{\begin{tabular}{@{}c@{}}The Idea \end{tabular}} +\frametitle{The Idea} \begin{center} \begin{tabular}{l@{\hspace{10mm}}r} @@ -119,31 +160,34 @@ \small \only<2>{ \begin{textblock}{12}(2,13.3) -Even if Bob has a hidden camera, a recording will not be convincing to anyone else -(Alice and Bob could have made it all up). +Even if Bob has a hidden camera, a recording will not be +convincing to anyone else (Alice and Bob could have made it +all up). \end{textblock}} \only<3>{ \begin{textblock}{12}(2,13.3) -Even worse, an observer present at the experiment would not be convinced. +Even worse, an observer present at the experiment would not be +convinced. \end{textblock}} -\end{frame}} +\end{frame} %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% -\mode{ \begin{frame}[c] \frametitle{Applications of ZKPs} \begin{itemize} -\item authentication, where one party wants to prove its identity to a -second party via some secret information, but doesn't want the second -party to learn anything about this secret\bigskip -\item to enforce honest behaviour while maintaining privacy: the idea is to -force a user to prove, using a zero-knowledge proof, that its behaviour is -correct according to the protocol +\item authentication, where one party wants to prove its + identity to a second party via some secret information, + but doesn't want the second party to learn anything + about this secret\bigskip +\item to enforce honest behaviour while maintaining privacy: + the idea is to force users to prove, using a + zero-knowledge proof, that their behaviour is correct + according to the protocol \end{itemize} -\end{frame}} +\end{frame} %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% @@ -221,10 +265,10 @@ A: We can generate a fake transcript of a conversation, which cannot be distinguished from a ``real'' conversation.\bigskip -Anything Bob can compute using the information obtained from -the transcript can be computed using only a forged transcript and -therefore participation in such a communication does not increase -Bob's capability to perform any computation. +Anything Bob can compute using the information obtained from +the transcript can be computed using only a forged transcript +and therefore participation in such a communication does not +increase Bob's capability to perform any computation. \end{frame}} %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%