Binary file handouts/ho01.pdf has changed
--- a/handouts/ho01.tex Tue Dec 30 21:59:47 2014 +0000
+++ b/handouts/ho01.tex Wed Dec 31 01:49:20 2014 +0000
@@ -4,10 +4,13 @@
\lstset{language=JavaScript}
+
\begin{document}
+\fnote{\copyright{} Christian Urban, 2014}
\section*{Handout 1 (Security Engineering)}
+
Much of the material and inspiration in this module is taken
from the works of Bruce Schneier, Ross Anderson and Alex
Halderman. I think they are the world experts in the area of
Binary file handouts/ho02.pdf has changed
--- a/handouts/ho02.tex Tue Dec 30 21:59:47 2014 +0000
+++ b/handouts/ho02.tex Wed Dec 31 01:49:20 2014 +0000
@@ -3,6 +3,7 @@
\usepackage{../langs}
\begin{document}
+\fnote{\copyright{} Christian Urban, 2014}
\section*{Handout 2 (E-Voting)}
Binary file handouts/ho03.pdf has changed
--- a/handouts/ho03.tex Tue Dec 30 21:59:47 2014 +0000
+++ b/handouts/ho03.tex Wed Dec 31 01:49:20 2014 +0000
@@ -5,6 +5,7 @@
\usepackage{../data}
\begin{document}
+\fnote{\copyright{} Christian Urban, 2014}
\section*{Handout 3 (Buffer Overflow Attacks)}
Binary file handouts/ho04.pdf has changed
--- a/handouts/ho04.tex Tue Dec 30 21:59:47 2014 +0000
+++ b/handouts/ho04.tex Wed Dec 31 01:49:20 2014 +0000
@@ -3,6 +3,7 @@
\usepackage{../langs}
\begin{document}
+\fnote{\copyright{} Christian Urban, 2014}
\section*{Handout 4 (Access Control)}
@@ -28,7 +29,8 @@
and e\underline{\textbf{x}}ecute. Moreover there are three
user groups to which the modes apply: the owner of the file,
the group the file is associated with and everybody else.
-A typical permission of a file owned by \texttt{bob} might look as
+A typical permission of a file owned by \texttt{bob}
+being in the group \texttt{staff} might look as
follows:
\begin{center}
@@ -41,8 +43,8 @@
\noindent For the moment let us ignore the directory bit. The
Unix access rules imply that Bob will only have read access to
-this file, even if he is in the group \texttt{staff} and the
-group access permissions allow read and write. Similarly every
+this file, even if he is in the group \texttt{staff} and this
+group's access permissions allow read and write. Similarly every
member in the \texttt{staff} group who is not \texttt{bob},
will only have read-write access permissions, not
read-write-execute.
Binary file handouts/ho05.pdf has changed
--- a/handouts/ho05.tex Tue Dec 30 21:59:47 2014 +0000
+++ b/handouts/ho05.tex Wed Dec 31 01:49:20 2014 +0000
@@ -3,6 +3,7 @@
\usepackage{../langs}
\begin{document}
+\fnote{\copyright{} Christian Urban, 2014}
\section*{Handout 5 (Protocols)}
Binary file handouts/ho06.pdf has changed
--- a/handouts/ho06.tex Tue Dec 30 21:59:47 2014 +0000
+++ b/handouts/ho06.tex Wed Dec 31 01:49:20 2014 +0000
@@ -2,6 +2,7 @@
\usepackage{../style}
\begin{document}
+\fnote{\copyright{} Christian Urban, 2014}
\section*{Handout 6 (Zero-Knowledge Proofs)}
@@ -379,9 +380,13 @@
\subsubsection*{Using Modular Arithmetic for ZKP Protocols}
-Another NP-problem is to calculate discrete logarithms. It can
-be used by choosing public numbers $A$, $B$, $p$, and private
-$x$ such that
+While information can be encoded into graph isomorphisms, it
+is not the most convenient carrier of information. Clearly it
+is much easier to encode information into numbers. Let us look
+at zero-knowledge proofs that use numbers as secrets. For this
+the underlying NP-problem is to calculate discrete logarithms.
+It can be used by choosing public numbers $A$, $B$, $p$, and
+private $x$ such that
\begin{center}
$A^x \equiv B\; mod\; p$
@@ -406,6 +411,11 @@
http://zk-ssh.cms.ac/docs/Zero_Knowledge_Prinzipien.pdf
http://www.wisdom.weizmann.ac.il/~oded/PS/zk-tut02v4.ps
+socialist millionares problem
+http://en.wikipedia.org/wiki/Socialist_millionaire
+http://twistedoakstudios.com/blog/Post3724_explain-it-like-im-five-the-socialist-millionaire-problem-and-secure-multi-party-computation
+
+
%%% Local Variables:
%%% mode: latex
%%% TeX-master: t
Binary file handouts/ho07.pdf has changed
--- a/handouts/ho07.tex Tue Dec 30 21:59:47 2014 +0000
+++ b/handouts/ho07.tex Wed Dec 31 01:49:20 2014 +0000
@@ -3,6 +3,7 @@
\usepackage{../graphics}
\begin{document}
+\fnote{\copyright{} Christian Urban, 2014}
\section*{Handout 7 (Privacy)}
@@ -55,7 +56,7 @@
this request, that is you.
\begin{center}
-\includegraphics[scale=0.17]{../pics/verizon.png}
+\includegraphics[scale=0.16]{../pics/verizon.png}
\end{center}
\noindent How disgusting! Even worse, Verizon is not known for
Binary file handouts/ho08.pdf has changed
--- a/handouts/ho08.tex Tue Dec 30 21:59:47 2014 +0000
+++ b/handouts/ho08.tex Wed Dec 31 01:49:20 2014 +0000
@@ -4,6 +4,7 @@
\usepackage{../langs}
\begin{document}
+\fnote{\copyright{} Christian Urban, 2014}
\section*{Handout 8 (Bitcoins)}
Binary file handouts/ho09.pdf has changed
--- a/handouts/ho09.tex Tue Dec 30 21:59:47 2014 +0000
+++ b/handouts/ho09.tex Wed Dec 31 01:49:20 2014 +0000
@@ -6,6 +6,7 @@
\usepackage{multicol}
\begin{document}
+\fnote{\copyright{} Christian Urban, 2014}
\section*{Handout 9 (Static Analysis)}
Binary file hws/hw01.pdf has changed
Binary file hws/hw02.pdf has changed
Binary file hws/hw03.pdf has changed
Binary file hws/hw04.pdf has changed
Binary file hws/hw05.pdf has changed
Binary file hws/hw06.pdf has changed
Binary file hws/hw07.pdf has changed
Binary file hws/hw08.pdf has changed
Binary file hws/so04.pdf has changed
--- a/progs/read2.c Tue Dec 30 21:59:47 2014 +0000
+++ /dev/null Thu Jan 01 00:00:00 1970 +0000
@@ -1,47 +0,0 @@
-#include <stdio.h>
-#include <unistd.h>
-#include <errno.h>
-
-FILE *f; //file pointer
-
-//tests return errno = 13 for permission denied
-void read_test(char *name)
-{
- if ((f = fopen(name, "r")) == NULL) {
- printf("%s is not readable, errno = %d\n", name, errno);
- } else {
- printf("%s is readable\n", name); fclose(f);
- }
-}
-
-void write_test(char *name)
-{
- if ((f = fopen(name, "r+")) == NULL) {
- printf("%s is not writable, errno = %d\n", name, errno);
- } else {
- printf("%s is writable\n", name); fclose(f);
- }
-}
-
-int main(int argc, char *argv[])
-{
- printf("Real UID = %d\n", getuid());
- printf("Effective UID = %d\n", geteuid());
-
- read_test(argv[1]);
- write_test(argv[1]);
-
- //lowering the access rights to the caller
- if (setuid(getuid())) {
- printf("could not reset setuid, errno = %d\n", errno);
- return 1;
- }
-
- printf("Real UID = %d\n", getuid());
- printf("Effective UID = %d\n", geteuid());
-
- read_test(argv[1]);
- write_test(argv[1]);
-
- return 0;
-}
Binary file slides/slides01.pdf has changed
Binary file slides/slides02.pdf has changed
Binary file slides/slides03.pdf has changed
Binary file slides/slides04.pdf has changed
Binary file slides/slides05.pdf has changed
Binary file slides/slides06.pdf has changed
Binary file slides/slides07.pdf has changed
Binary file slides/slides08.pdf has changed
Binary file slides/slides09.pdf has changed
Binary file slides/slides10.pdf has changed
Binary file slides/slides11.pdf has changed
--- a/style.sty Tue Dec 30 21:59:47 2014 +0000
+++ b/style.sty Wed Dec 31 01:49:20 2014 +0000
@@ -26,3 +26,7 @@
\newcommand\Grid[1]{%
\@tfor\z:=#1\do{\grid{\z}}}
\makeatother
+
+\makeatletter
+\def\fnote{\gdef\@thefnmark{}\@footnotetext}
+\makeatother