Lecture 24: CS551 Jeopardy Who wants to be a quadrillion ire? CS551: Security and Privacy University of Virginia Computer Science David Evans http://www.cs.virginia.edu/~evans Menu PS4 Comments Where to go from here Short term, medium term, long term Andy & Carl’s Independent Study Project Jeopardy 6 December 2000 University of Virginia CS 551 2 Course Name Suggestions Gregory Lamm & Dev Batta: “Opening security and cryptographic concepts within Pandora’s Digital Box” Dave Rubens & John Loizeaux: “Security, Privacy, and the Zen of Information Hiding” Chris Hayden and James Tsai: “Security and Privacy on the Internet: Putting Eve and Melissa out of business” 6 December 2000 University of Virginia CS 551 3 Course Name Suggestions Virginia Volk & Carl Morris: “Internet Security – Get them before they get you.”, “Internet Security – Why I no longer have a job because I once stated I hated the NSA.” Ryan Persaud & Sachin Kamath: “Cryptography, Privacy, and the Internet. (or: How to become paranoid and learn to “trust no one” in one semester) 6 December 2000 University of Virginia CS 551 4 Course Name Explanation “Security and Privacy on the Internet” Best security conference is called “IEEE Symposium on Security and Privacy” Using broader definition of “Privacy” (includes encryption, etc.) than Saltzer does. (Marketing purposes only) 6 December 2000 University of Virginia CS 551 5 Content Suggestions 1/3: More focus on practical system security issues 1/3: Go into more depth on fewer topics, just cover cryptography stuff in more detail Others: Have 2 separate courses: 1 on cryptology and protocols, 1 on system security Have some implementation assignments (e.g., encryption algorithms) 6 December 2000 University of Virginia CS 551 6 Where to go from here? Short Term 5:00 Today, Olsson 009 Graduate Information Dinner Jessica Hodgins (CMU) and Lisa Zheng (Lucent), Carla Ellis (Duke) Tomorrow, 5-8 PM, O’Neill’s Happ-E Hour! Friday, Dec 15 (noon) – CS Department Holiday party and Awards Show 6 December 2000 University of Virginia CS 551 7 Where to go from here? Short Term Take-home final – due Dec 11 at 5:00pm Fill out course evaluations Official SEAS evaluation by Dec 10 Unofficial course-specific evaluation – before you leave for winter break Go to Lorrie Cranor’s talk – Jan 24 6 December 2000 University of Virginia CS 551 8 Final Handed out at end of class today Final rules: Don’t talk to anyone about the final until after Monday Dec 11, 5:00 pm You may use any non-human resources you want (but cite what you use) No time limit (but you should be able to produce a full-credit answer in about 5 hours) 6 December 2000 University of Virginia CS 551 9 SEAS Course Evaluations Myths Dispelled by Team 7’s project. 1. They are secure. 2. They are anonymous. 3. The administration doesn’t take teaching seriously. Not true – read the SEAS Tenure guidelines (teaching is 1/3rd) 4. The administration doesn’t care what students think. Not true – but comments must be well-supported (e.g., “Prof sucks and smells bad.” is ignored.) 5. They are used to improve courses. Not true – need very specific questions to do this (hence December 2000 University of Virginia CS 551 the6 unofficial course-specific survey and PS4 #3.) 10 Course Evaluations Fill out the SEAS Evaluation by Dec. 10 (hopefully they will fix the site by then!) Its not secure, but I promise not to break in... Write comments based on whether you want me to get fired or promoted Fill out my course-specific survey Help improve future versions of the course for later students 6 December 2000 University of Virginia CS 551 11 Where to go from here? Long Term (4th Years) Get a cool security job Companies in Virginia/DC: Cigital, Portris CyberCash, NSA, Network Associates Companies further away: Counterpane, RSA, @Stake, CheckPoint, VeriSign, Cryptography 6 December 2000 University of Virginia CS 551 12 Where to go from here? Long Term (3rd Years) Do research project I will supervise (and possibly fund over summer) projects on: Static Checking Code Safety Programming the Swarm Your ideas if you can convince me they are interesting... 6 December 2000 University of Virginia CS 551 13 Thanks! 6 December 2000 University of Virginia CS 551 14 Andy & Carl’s Excellent Adventure 6 December 2000 University of Virginia CS 551 15 Jeopardy 6 December 2000 University of Virginia CS 551 16 Jeopardy Rules $1Q, $2Q, $4Q – raise hand to answer, first team spotted will be asked to answer, whoever is picked must answer right away Lose value for wrong answer. All teams answer $10Q questions, answer value at complete discretion of Dave Projects category: group who did the project cannot answer, until everyone else gives up After all questions, there will be Final Jeopardy Team with the highest total, gets prizes (don’t get cash) 6 December 2000 University of Virginia CS 551 17 Prizes: Top Team Simon Singh, “The Code Book” Stories about cryptography Douglas Hofstadter, “Gödel, Escher, Bach: An Eternal Golden Braid” Logic, Computability, Recursion, Paradoxes, etc. in art, music and CS Stephen Ambrose, “Undaunted Courage” How to manage research projects “Surely You’re Joking, Mr. Feynman” 6 December 2000 University of Virginia CS 551 18 Prizes: Winner and Runner-Up T-Shirts donated by RSA Prizes: Consolation “Beer for Dummies” “The Complete Idiot’s Guide to Making Millions on the Internet” 6 December 2000 University of Virginia CS 551 19 Security Jeopardy Ciphers History Challenges Cypherpunks Projects 1 1 1 1 1 2 2 2 2 2 4 4 4 4 4 10 10 10 10 Final Jeopardy (All values in $Quadrillions) Ciphers 1 Yjq kpxgpvgf vjku ekrjgt? 6 December 2000 University of Virginia CS 551 21 Ciphers 1 Who invented this cipher? Choices Julius Ceasar Return 6 December 2000 University of Virginia CS 551 22 Buffer 6 December 2000 University of Virginia CS 551 23 Ciphers 2 Kv xmmv a qjuhhgy glpiju? 6 December 2000 University of Virginia CS 551 24 Ciphers 2 Is this a perfect cipher? No (because of spaces) Yes (encrypted with Choices random one-time pad) Return 6 December 2000 University of Virginia CS 551 25 Buffer 6 December 2000 University of Virginia CS 551 26 Ciphers 4 What is RSA’s recommendation for the minimum size for a secure RSA key? Choices 6 December 2000 University of Virginia CS 551 27 Ciphers 4 What is RSA’s recommendation for the minimum size (in bits) for a secure RSA key? 128 256 512 768 1000 1024 2048 6 December 2000 University of Virginia CS 551 28 Ciphers 4 DAILY DOUBLE 6 December 2000 University of Virginia CS 551 29 Ciphers 4 Given your previous answer, why did Netscape’s SSL v3 specification use 512-bit RSA keys? 6 December 2000 University of Virginia CS 551 30 Ciphers 4 Given your previous answer, why did Netscape’s SSL v3 specification use 512-bit RSA keys? Answer: US Law (until January 2000) prohibited export of RSA implementations with more than 512-bit keys. Return 6 December 2000 University of Virginia CS 551 31 Buffer 6 December 2000 University of Virginia CS 551 32 Ciphers 10 Explain the following names: (Sometimes a creative “incorrect” answer is better than a dull, correct one.) CFB DES RSA RC6 SHA SSL 6 December 2000 University of Virginia CS 551 33 Return Ciphers 10 CFB DES RSA RC6 SHA SSL 6 December 2000 Cipher Feedback Mode Data Encryption Standard Rivest, Shamir, Adelman Rivest Cipher (aka Ron’s Code) 6 Secure Hash Algorithm Secure Sockets Layer University of Virginia CS 551 34 Buffer 6 December 2000 University of Virginia CS 551 35 When was this written: History 1 Available within the network will be functions and services to which you subscribe on a regular basis and others that you call for when you need them. In the former group will be investment guidance, tax counseling, selective dissemination of information in your field of specialization, announcement of cultural, sport, and entertainment events that fit your interests, etc. In the latter group will be dictionaries, encyclopedias, indexes, catalogues, editing programs, teaching programs, testing programs, programming systems, data bases, and – most important – communication, display, and modeling programs. All these will be – at some late date in the history of networking systematized and coherent; you will be able to get along in one basic language up to the point at which you choose a specialized language for its power or terseness. 6 December 2000 University of Virginia CS 551 36 History 1 1968 J.C.R. Licklider and Robert Taylor, Computer as a Communications Device. Return 6 December 2000 University of Virginia CS 551 37 Buffer 6 December 2000 University of Virginia CS 551 38 History 2 Put these in chronological order by when they were invented: DES Diffie-Hellman Key Exchange LUCIFER RSA 6 December 2000 University of Virginia CS 551 39 History 2 LUCIFER (1971) Diffie-Hellman Key Exchange (1976) DES (1977 – based on LUCIFER) RSA (1978) Return 6 December 2000 University of Virginia CS 551 40 History 2 More correct answer: LUCIFER (1971) RSA (1973) As discovered by Clifford Cocks at GHCQ Diffie-Hellman Key Exchange (1974) As discovered by Malcolm Williamson at GHCQ DES (1977) Return 6 December 2000 University of Virginia CS 551 41 Buffer 6 December 2000 University of Virginia CS 551 42 History 4 Which British Naval Intelligence officer concocted a plan to steal Enigma keys by pretending to crash a German bomber near a German ship? Hint 6 December 2000 University of Virginia CS 551 43 History 4 Which British Naval Intelligence officer concocted a plan to steal Enigma keys by pretending to crash a German bomber near a German ship? Hint: After the war, he wrote some spy novels about plans almost as absurd. 6 December 2000 University of Virginia CS 551 44 History 4 Fleming, Ian Fleming. (Creator of James Bond). Return 6 December 2000 University of Virginia CS 551 45 Buffer 6 December 2000 University of Virginia CS 551 46 History 10 Who of the following (on next slide) had an office on the 5th floor of NE43 while Dave was a grad student there? (tiebreak: where were others) 6 December 2000 University of Virginia CS 551 47 History 10 Who of the following had an office on the 5th floor of NE43 while Dave was a grad student there? (tiebreak: where were others) Fernando Corbató (leader of Multics project) Stephanie Forrest (computer immunology) Butler Lampson (leader of first PC, Xerox Alto) J. C. R. Licklider (Internet visionary) Barbara Liskov (first language with good type-safe data abstractions) Robert Morris, Jr. (author of 1988 Internet Worm) Ron Rivest (RSA) Jerome Saltzer (Multics security; principles paper) 6 December 2000 University of Virginia CS 551 48 History 10 Who of the following had an office on the 5th floor of NE43 while Dave was a grad student there? (tiebreak: where were others) Fernando Corbató (leader of Multics project) Stephanie Forrest (computer immunology) On 6th floor, and in New Mexico. Butler Lampson (leader of first PC, Xerox Alto) J. C. R. Licklider (Internet visionary) Died in 1990. Barbara Liskov (first language with good type-safe data abstractions) Robert Morris, Jr. (author of 1988 Internet Worm) Ron Rivest (RSA) Return rd On 3 floor. Jerome Saltzer (Multics security; principles paper) 6 December 2000 University of Virginia CS 551 49 Buffer 6 December 2000 University of Virginia CS 551 50 Challenges 1 How many of the 4 SDMI watermark test challenges were broken, and how much of the $10K award was given? 4, $0. Return 6 December 2000 University of Virginia CS 551 51 Buffer 6 December 2000 University of Virginia CS 551 52 Challenges 2 What document is encrypted in the Jefferson Wheel Challenge? A. The Declaration of Independence B. Jefferson’s Letter to Madison on Louisiana Purchase C. CS 551 Course Syllabus D. Virginia Statutes on Religious Freedom E. Jefferson’s Letter on Plans for the University of Virginia 6 December 2000 University of Virginia CS 551 53 Challenges 2 What document is encrypted in the Jefferson Wheel Challenge? A. The Declaration of Independence B. Jefferson’s Letter to Madison on Louisiana Purchase C. CS 551 Course Syllabus D. Virginia Statutes on Religious Freedom E. Jefferson’s Letter on Plans for the University of Virginia Return 6 December 2000 University of Virginia CS 551 54 Buffer 6 December 2000 University of Virginia CS 551 55 Challenges 4 Why does the absentee ballot protocol require voter to open Envelope A in presence of a witness? A. “No good reason at all, really.” B. “So voter can’t sell vote.” C. “So voter knows ballot is valid.” D. “So witness knows ballot is valid.” E. “So people too dumb to follow instructions can’t vote.” 6 December 2000 University of Virginia CS 551 56 Challenges 4 Why does the absentee ballot protocol require voter to open Envelope A in presence of a witness? A. “No good reason at all, really.” B. “So voter can’t sell vote.” C. “So voter knows ballot is valid.” D. “So witness knows ballot is valid.” E. “So people too dumb to follow instructions can’t vote.” Return 6 December 2000 University of Virginia CS 551 57 Buffer 6 December 2000 University of Virginia CS 551 58 Challenges 10 Put the following in order of increasing time: A. VeriSign’s claim on time required to break 128bit SSL encryption B. Greg Lamm’s answer on the time required to break 128-bit SSL encryption C. Ron Rivest’s original prediction on time required to break RSA-129 puzzle D. Actual time to break RSA-129 puzzle E. Time until the sun goes nova F. Age of the Universe 6 December 2000 University of Virginia CS 551 59 Challenges 10 A. VeriSign’s claim 1023 years B. Greg Lamm’s answer 1019 years C. Ron Rivest’s prediction 1015 years D. Actual time to break RSA-129 .75 years (30 years later) E. Time until the sun goes nova 109 years F. Age of the Universe 1010 years Answer: DEFCBA 6 December 2000 University of Virginia CS 551 Return 60 Buffer 6 December 2000 University of Virginia CS 551 61 Cypherpunks 1 Who is the Colleen Hacker in real life? Psychologist for the US Answer Women’s National Team Return 6 December 2000 University of Virginia CS 551 62 Buffer 6 December 2000 University of Virginia CS 551 63 Cypherpunks 2 Who has been called “The First Cypherpunk”? 6 December 2000 University of Virginia CS 551 64 Whit Diffie 6 December 2000 University of Virginia CS 551 Return 65 Buffer 6 December 2000 University of Virginia CS 551 66 Cypherpunks 4 How long was Phil Zimmerman the subject of an FBI-instigated grand jury investigation for exporting strong crypto in PGP? 6 December 2000 University of Virginia CS 551 67 Cypherpunks 4 Return How long was Phil Zimmerman the subject of an FBI-instigated grand jury investigation for exporting strong crypto in PGP? Not at all 3 months 6 December 2000 2 weeks 1 month 1 year 3 years University of Virginia CS 551 68 Buffer 6 December 2000 University of Virginia CS 551 69 Cypherpunks 10 Put these in order of increasing value: A. Damage done by ILoveYou Virus B. CheckPoint’s valuation (noon today) C. NSA annual budget D. Amount Bill Gates’ Foundation is giving away E. Yesterday’s increase in total market value (NYSE/Nasdaq) F. GDP of Ireland in 1998 6 December 2000 University of Virginia CS 551 70 Cypherpunks 10 A. B. C. D. E. Damage done by ILoveYou Virus (~$10B) CheckPoint’s valuation (noon today) (~$22B) NSA annual budget (probably $3B-15B, not public) Amount Bill Gates’ Foundation is giving away ($21B) Yesterday’s increase in total market value (NYSE/Nasdaq) (~$500B) F. GDP of Ireland in 1998 ($67B) Answer: A D B F E (C somewhere between 1st and 4th) Return 6 December 2000 University of Virginia CS 551 71 Buffer 6 December 2000 University of Virginia CS 551 72 Projects 1 [Team 11] Who was Bluetooth named after? 10th Answer Century Danish King 6 December 2000 University of Virginia CS 551 Return 73 Buffer 6 December 2000 University of Virginia CS 551 74 Projects 2 [Team 1] How many different keys are required to support 8 members in a key graph? 6 December 2000 University of Virginia CS 551 75 Projects 2 [Team 1] How many different keys are required to support 8 members in a key graph? 6 (2 * log2 8) 6 December 2000 University of Virginia CS 551 76 Return Key Graph SK K2 K2 K1 K0 K1 K1 K1 K0 6 December 2000 University of Virginia CS 551 77 Buffer 6 December 2000 University of Virginia CS 551 78 Projects 4 Who (according to a literal interpretation of the new SEAS patent policy) owns all the original ideas you developed for your projects, problem sets and the take-home final? 6 December 2000 University of Virginia CS 551 79 Projects 4 Who (according to a literal interpretation of the new SEAS patent policy) owns all the original ideas you developed for your projects, problem sets and the take-home final? UVA Patent Foundation 6 December 2000 University of Virginia CS 551 80 New SEAS Patent Policy This Policy also applies to and binds all undergraduate and graduate students and others engaged in research at UVA as a condition of their participation in such research, irrespective of whether such participation is full-time or part-time, for class credit or not, or whether they are paid for such participation. Inventions that are made in the course of research carried out at UVA, made using funds administered by UVA, or otherwise made through the use of significant UVA resources not available to the public are the exclusive property of UVA. 6 December 2000 University of Virginia CS 551 81 Final Jeopardy: RSA 6 December 2000 University of Virginia CS 551 82 Final Jeopardy What are the RSA encryption and decryption algorithms? Break even: what is on my license plate Win bet: Everything on the back of the shirt: Encryption & decryption formulae Meaning and properties of all terms used in the formulae 6 December 2000 3021876549Up! Time’s10 University of Virginia CS 551 83