updated
authorChristian Urban <christian dot urban at kcl dot ac dot uk>
Thu, 26 Nov 2015 12:28:10 +0000
changeset 437 08906f4325bb
parent 436 8bf6704fc991
child 438 85a25932811f
updated
hws/hw07.pdf
hws/hw07.tex
slides/slides11.pdf
slides/slides11.tex
Binary file hws/hw07.pdf has changed
--- a/hws/hw07.tex	Thu Nov 26 11:59:38 2015 +0000
+++ b/hws/hw07.tex	Thu Nov 26 12:28:10 2015 +0000
@@ -13,7 +13,7 @@
 \item What is a \emph{re-identification attack}?
 
 \item Imagine you have a completely `innocent' email message,
-      like birthday wishes to your grandmother? Why should you
+      like birthday wishes to your grandmother. Why should you
       still encrypt this message and your grandmother take the
       effort to decrypt it? 
 
Binary file slides/slides11.pdf has changed
--- a/slides/slides11.tex	Thu Nov 26 11:59:38 2015 +0000
+++ b/slides/slides11.tex	Thu Nov 26 12:28:10 2015 +0000
@@ -36,7 +36,7 @@
 
 \begin{bubble}[10cm]
 Imagine you have a completely innocent email message, like
-birthday wishes to your grandmother? Why should you still
+birthday wishes to your grandmother. Why should you still
 encrypt this message and your grandmother take the effort to
 decrypt it?
 \end{bubble}
@@ -61,12 +61,13 @@
 \footnotesize\mbox{M.C.Escher, Amazing World (from Gödel, Escher, Bach by D.Hofstadter)} 
 \end{center}
 
+\hfill\includegraphics[scale=0.3]{../pics/hofstadter.jpg}
 \end{frame}
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%  
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 \begin{frame}[c]
-\frametitle{Interlock Protocol}
+\frametitle{Interlock Protocols}
 
 \mbox{A Protocol between a car \bl{$C$} and a key transponder \bl{$T$}:}\bigskip 
 
@@ -475,13 +476,14 @@
 \frametitle{Coming Back To\ldots}
 
 \begin{bubble}[10cm]
-Imagine you have an completely innocent email message, like
-birthday wishes to your grandmother? Why should you still
+Imagine you have a completely innocent email message, like
+birthday wishes to your grandmother. Why should you still
 encrypt this message and your grandmother take the effort to
 decrypt it?
 \end{bubble}\pause
       
 \begin{itemize}      
+\item \small Any wild guesses?\pause
 \item \small
       Bruce Schneier\\
       NSA Surveillance and What To Do About It\\
@@ -503,7 +505,6 @@
 Skype and everything else UK or US-made, which they can use
 eavesdrop on conversations without the conversants' knowledge
 or consent.
-
 \end{bubble}      
 
 \begin{itemize}