march 2005 1r. smith - university of st thomas - minnesota qmcs 490 - class today “enigma” recap...

7
March 2005 1 R. Smith - University of St Thomas - Minnesota QMCS 490 - Class Today QMCS 490 - Class Today Enigma” recap and finish Enigma” recap and finish The quiz/survey The quiz/survey Next homework assignment Next homework assignment Desktop Crypto implementations Desktop Crypto implementations

Upload: lesley-hines

Post on 14-Dec-2015

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: March 2005 1R. Smith - University of St Thomas - Minnesota QMCS 490 - Class Today “Enigma” recap and finish“Enigma” recap and finish The quiz/surveyThe

March 2005 1R. Smith - University of St Thomas - Minnesota

QMCS 490 - Class TodayQMCS 490 - Class Today

• ““Enigma” recap and finishEnigma” recap and finish• The quiz/surveyThe quiz/survey• Next homework assignmentNext homework assignment• Desktop Crypto implementationsDesktop Crypto implementations

Page 2: March 2005 1R. Smith - University of St Thomas - Minnesota QMCS 490 - Class Today “Enigma” recap and finish“Enigma” recap and finish The quiz/surveyThe

March 2005 2R. Smith - University of St Thomas - Minnesota

Homework AssignmentHomework Assignment

• Look up some things in Chapter 5Look up some things in Chapter 5• Use Moore’s Law to guess how large of a Use Moore’s Law to guess how large of a

crypto key a DES Cracker-style computer can crypto key a DES Cracker-style computer can crack in a given year.crack in a given year.

• Turn the calculation around and guess the year Turn the calculation around and guess the year in which such a machine will be able to crack a in which such a machine will be able to crack a key of a given size.key of a given size.

• Print out Chapters 1 and 2. Look at pretty Print out Chapters 1 and 2. Look at pretty picture and diagrams. Read a few stories. Bring picture and diagrams. Read a few stories. Bring them to class on Monday.them to class on Monday.

Page 3: March 2005 1R. Smith - University of St Thomas - Minnesota QMCS 490 - Class Today “Enigma” recap and finish“Enigma” recap and finish The quiz/surveyThe

March 2005 3R. Smith - University of St Thomas - Minnesota

Desktop Crypto ImplementationsDesktop Crypto Implementations

• File encryptionFile encryption– User controlled; sharing and separation on computerUser controlled; sharing and separation on computer

• Volume encryptionVolume encryption– Device driver encrypts data written to the driveDevice driver encrypts data written to the drive– Can’t boot without a password/phrase/keyCan’t boot without a password/phrase/key– Users can steal from each otherUsers can steal from each other– Everything is safe if stolen (and key is unknown)Everything is safe if stolen (and key is unknown)

• Hard drive encryptionHard drive encryption– Fast crypto built into hard driveFast crypto built into hard drive– Users can steal from each otherUsers can steal from each other– Crypto is harder to disableCrypto is harder to disable– Problem: how do we handle the key?Problem: how do we handle the key?

Page 4: March 2005 1R. Smith - University of St Thomas - Minnesota QMCS 490 - Class Today “Enigma” recap and finish“Enigma” recap and finish The quiz/surveyThe

March 2005 4R. Smith - University of St Thomas - Minnesota

Software Crypto DilemmasSoftware Crypto Dilemmas

• How do we keep the crypto safe?How do we keep the crypto safe?– What can ‘they’ subvertWhat can ‘they’ subvert

• Subversion examplesSubversion examples– File encryptionFile encryption– Hard drive encryptionHard drive encryption

• Access control protectionsAccess control protections

Page 5: March 2005 1R. Smith - University of St Thomas - Minnesota QMCS 490 - Class Today “Enigma” recap and finish“Enigma” recap and finish The quiz/surveyThe

March 2005 5R. Smith - University of St Thomas - Minnesota

Access Control for this classAccess Control for this class

• For Access Control ExamplesFor Access Control Examples• Three elements to considerThree elements to consider

– Operating system – always has full accessOperating system – always has full access– Owner (usually the creator) – always has full accessOwner (usually the creator) – always has full access– Everyone else – access may be restrictedEveryone else – access may be restricted

• To specify access on a file or other assetTo specify access on a file or other asset– Identify the ownerIdentify the owner– Identify permissions granted to everyone else, if anyIdentify permissions granted to everyone else, if any

• Access permissions to grantAccess permissions to grant– Read, write – usual meaningRead, write – usual meaning– Execute – if executable, may be executed by other usersExecute – if executable, may be executed by other users– Search – for directories: can’t read but can search Search – for directories: can’t read but can search

Page 6: March 2005 1R. Smith - University of St Thomas - Minnesota QMCS 490 - Class Today “Enigma” recap and finish“Enigma” recap and finish The quiz/surveyThe

March 2005 6R. Smith - University of St Thomas - Minnesota

Access Control for CryptoAccess Control for Crypto

• Who owns the executable?Who owns the executable?• Who can modify it?Who can modify it?• Who owns keys?Who owns keys?

Page 7: March 2005 1R. Smith - University of St Thomas - Minnesota QMCS 490 - Class Today “Enigma” recap and finish“Enigma” recap and finish The quiz/surveyThe

March 2005 7R. Smith - University of St Thomas - Minnesota

Creative Commons LicenseCreative Commons License

This work is licensed under the Creative This work is licensed under the Creative Commons Attribution-Share Alike 3.0 United Commons Attribution-Share Alike 3.0 United

States License. To view a copy of this license, States License. To view a copy of this license, visit http://creativecommons.org/licenses/by-visit http://creativecommons.org/licenses/by-

sa/3.0/us/ or send a letter to Creative sa/3.0/us/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Commons, 171 Second Street, Suite 300, San

Francisco, California, 94105, USA.Francisco, California, 94105, USA.