updated
authorChristian Urban <christian dot urban at kcl dot ac dot uk>
Wed, 31 Dec 2014 01:49:20 +0000
changeset 366 34a8f73b2c94
parent 365 942205605c30
child 367 3f0738fc8230
updated
handouts/ho01.pdf
handouts/ho01.tex
handouts/ho02.pdf
handouts/ho02.tex
handouts/ho03.pdf
handouts/ho03.tex
handouts/ho04.pdf
handouts/ho04.tex
handouts/ho05.pdf
handouts/ho05.tex
handouts/ho06.pdf
handouts/ho06.tex
handouts/ho07.pdf
handouts/ho07.tex
handouts/ho08.pdf
handouts/ho08.tex
handouts/ho09.pdf
handouts/ho09.tex
hws/hw01.pdf
hws/hw02.pdf
hws/hw03.pdf
hws/hw04.pdf
hws/hw05.pdf
hws/hw06.pdf
hws/hw07.pdf
hws/hw08.pdf
hws/so04.pdf
progs/read2.c
slides/slides01.pdf
slides/slides02.pdf
slides/slides03.pdf
slides/slides04.pdf
slides/slides05.pdf
slides/slides06.pdf
slides/slides07.pdf
slides/slides08.pdf
slides/slides09.pdf
slides/slides10.pdf
slides/slides11.pdf
style.sty
Binary file handouts/ho01.pdf has changed
--- a/handouts/ho01.tex	Tue Dec 30 21:59:47 2014 +0000
+++ b/handouts/ho01.tex	Wed Dec 31 01:49:20 2014 +0000
@@ -4,10 +4,13 @@
 
 \lstset{language=JavaScript}
 
+
 \begin{document}
+\fnote{\copyright{} Christian Urban, 2014}
 
 \section*{Handout 1 (Security Engineering)}
 
+
 Much of the material and inspiration in this module is taken
 from the works of Bruce Schneier, Ross Anderson and Alex
 Halderman. I think they are the world experts in the area of
Binary file handouts/ho02.pdf has changed
--- a/handouts/ho02.tex	Tue Dec 30 21:59:47 2014 +0000
+++ b/handouts/ho02.tex	Wed Dec 31 01:49:20 2014 +0000
@@ -3,6 +3,7 @@
 \usepackage{../langs}
 
 \begin{document}
+\fnote{\copyright{} Christian Urban, 2014}
 
 \section*{Handout 2 (E-Voting)}
 
Binary file handouts/ho03.pdf has changed
--- a/handouts/ho03.tex	Tue Dec 30 21:59:47 2014 +0000
+++ b/handouts/ho03.tex	Wed Dec 31 01:49:20 2014 +0000
@@ -5,6 +5,7 @@
 \usepackage{../data}
 
 \begin{document}
+\fnote{\copyright{} Christian Urban, 2014}
 
 \section*{Handout 3 (Buffer Overflow Attacks)}
 
Binary file handouts/ho04.pdf has changed
--- a/handouts/ho04.tex	Tue Dec 30 21:59:47 2014 +0000
+++ b/handouts/ho04.tex	Wed Dec 31 01:49:20 2014 +0000
@@ -3,6 +3,7 @@
 \usepackage{../langs}
 
 \begin{document}
+\fnote{\copyright{} Christian Urban, 2014}
 
 \section*{Handout 4 (Access Control)}
 
@@ -28,7 +29,8 @@
 and e\underline{\textbf{x}}ecute. Moreover there are three
 user groups to which the modes apply: the owner of the file,
 the group the file is associated with and everybody else. 
-A typical permission of a file owned by \texttt{bob} might look as 
+A typical permission of a file owned by \texttt{bob} 
+being in the group \texttt{staff} might look as 
 follows:
 
 \begin{center}
@@ -41,8 +43,8 @@
 
 \noindent For the moment let us ignore the directory bit. The
 Unix access rules imply that Bob will only have read access to
-this file, even if he is in the group \texttt{staff} and the
-group access permissions allow read and write. Similarly every
+this file, even if he is in the group \texttt{staff} and this
+group's access permissions allow read and write. Similarly every
 member in the \texttt{staff} group who is not \texttt{bob},
 will only have read-write access permissions, not
 read-write-execute.
Binary file handouts/ho05.pdf has changed
--- a/handouts/ho05.tex	Tue Dec 30 21:59:47 2014 +0000
+++ b/handouts/ho05.tex	Wed Dec 31 01:49:20 2014 +0000
@@ -3,6 +3,7 @@
 \usepackage{../langs}
 
 \begin{document}
+\fnote{\copyright{} Christian Urban, 2014}
 
 \section*{Handout 5 (Protocols)}
 
Binary file handouts/ho06.pdf has changed
--- a/handouts/ho06.tex	Tue Dec 30 21:59:47 2014 +0000
+++ b/handouts/ho06.tex	Wed Dec 31 01:49:20 2014 +0000
@@ -2,6 +2,7 @@
 \usepackage{../style}
 
 \begin{document}
+\fnote{\copyright{} Christian Urban, 2014}
 
 \section*{Handout 6 (Zero-Knowledge Proofs)}
 
@@ -379,9 +380,13 @@
 
 \subsubsection*{Using Modular Arithmetic for ZKP Protocols}
 
-Another NP-problem is to calculate discrete logarithms. It can
-be used by choosing public numbers $A$, $B$, $p$, and private
-$x$ such that
+While information can be encoded into graph isomorphisms, it
+is not the most convenient carrier of information. Clearly it
+is much easier to encode information into numbers. Let us look
+at zero-knowledge proofs that use numbers as secrets. For this
+the underlying NP-problem is to calculate discrete logarithms.
+It can be used by choosing public numbers $A$, $B$, $p$, and
+private $x$ such that
 
 \begin{center}
 $A^x \equiv B\; mod\; p$
@@ -406,6 +411,11 @@
 http://zk-ssh.cms.ac/docs/Zero_Knowledge_Prinzipien.pdf
 http://www.wisdom.weizmann.ac.il/~oded/PS/zk-tut02v4.ps
 
+socialist millionares problem
+http://en.wikipedia.org/wiki/Socialist_millionaire
+http://twistedoakstudios.com/blog/Post3724_explain-it-like-im-five-the-socialist-millionaire-problem-and-secure-multi-party-computation
+
+
 %%% Local Variables: 
 %%% mode: latex
 %%% TeX-master: t
Binary file handouts/ho07.pdf has changed
--- a/handouts/ho07.tex	Tue Dec 30 21:59:47 2014 +0000
+++ b/handouts/ho07.tex	Wed Dec 31 01:49:20 2014 +0000
@@ -3,6 +3,7 @@
 \usepackage{../graphics}
 
 \begin{document}
+\fnote{\copyright{} Christian Urban, 2014}
 
 \section*{Handout 7 (Privacy)}
 
@@ -55,7 +56,7 @@
 this request, that is you.
  
 \begin{center}
-\includegraphics[scale=0.17]{../pics/verizon.png}
+\includegraphics[scale=0.16]{../pics/verizon.png}
 \end{center}
 
 \noindent How disgusting! Even worse, Verizon is not known for
Binary file handouts/ho08.pdf has changed
--- a/handouts/ho08.tex	Tue Dec 30 21:59:47 2014 +0000
+++ b/handouts/ho08.tex	Wed Dec 31 01:49:20 2014 +0000
@@ -4,6 +4,7 @@
 \usepackage{../langs}
 
 \begin{document}
+\fnote{\copyright{} Christian Urban, 2014}
 
 \section*{Handout 8 (Bitcoins)}
 
Binary file handouts/ho09.pdf has changed
--- a/handouts/ho09.tex	Tue Dec 30 21:59:47 2014 +0000
+++ b/handouts/ho09.tex	Wed Dec 31 01:49:20 2014 +0000
@@ -6,6 +6,7 @@
 \usepackage{multicol}
 
 \begin{document}
+\fnote{\copyright{} Christian Urban, 2014}
 
 \section*{Handout 9 (Static Analysis)}
 
Binary file hws/hw01.pdf has changed
Binary file hws/hw02.pdf has changed
Binary file hws/hw03.pdf has changed
Binary file hws/hw04.pdf has changed
Binary file hws/hw05.pdf has changed
Binary file hws/hw06.pdf has changed
Binary file hws/hw07.pdf has changed
Binary file hws/hw08.pdf has changed
Binary file hws/so04.pdf has changed
--- a/progs/read2.c	Tue Dec 30 21:59:47 2014 +0000
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,47 +0,0 @@
-#include <stdio.h>
-#include <unistd.h>
-#include <errno.h>
-
-FILE *f; //file pointer
-
-//tests return errno = 13 for permission denied
-void read_test(char *name) 
-{
-    if ((f = fopen(name, "r")) == NULL) {
-      printf("%s is not readable, errno = %d\n", name, errno);
-    } else {
-      printf("%s is readable\n", name); fclose(f);
-    }
-}
-
-void write_test(char *name) 
-{
-    if ((f = fopen(name, "r+")) == NULL) {
-      printf("%s is not writable, errno = %d\n", name, errno);
-    } else {
-      printf("%s is writable\n", name); fclose(f);
-    }
-}
-
-int main(int argc, char *argv[])
-{   
-    printf("Real UID = %d\n", getuid());
-    printf("Effective UID = %d\n", geteuid());
-    
-    read_test(argv[1]);
-    write_test(argv[1]);
-
-    //lowering the access rights to the caller
-    if (setuid(getuid())) {  
-      printf("could not reset setuid, errno = %d\n", errno); 
-      return 1;
-    }
-        
-    printf("Real UID = %d\n", getuid());
-    printf("Effective UID = %d\n", geteuid());      
-
-    read_test(argv[1]);
-    write_test(argv[1]);
-
-    return 0;
-}
Binary file slides/slides01.pdf has changed
Binary file slides/slides02.pdf has changed
Binary file slides/slides03.pdf has changed
Binary file slides/slides04.pdf has changed
Binary file slides/slides05.pdf has changed
Binary file slides/slides06.pdf has changed
Binary file slides/slides07.pdf has changed
Binary file slides/slides08.pdf has changed
Binary file slides/slides09.pdf has changed
Binary file slides/slides10.pdf has changed
Binary file slides/slides11.pdf has changed
--- a/style.sty	Tue Dec 30 21:59:47 2014 +0000
+++ b/style.sty	Wed Dec 31 01:49:20 2014 +0000
@@ -26,3 +26,7 @@
 \newcommand\Grid[1]{%
   \@tfor\z:=#1\do{\grid{\z}}}
 \makeatother	
+
+\makeatletter
+\def\fnote{\gdef\@thefnmark{}\@footnotetext}
+\makeatother