Lecture 20: CS588 Jeopardy Who wants to be a quadrillionaire? CS588: Cryptology University of Virginia Computer Science David Evans http://www.cs.virginia.edu/~evans Menu Final Where to go from here Short term, medium term, long term Jeopardy 5 December 2001 University of Virginia CS 558 2 Final Take-home Use anything you want except other people, cite any sources you use Pick up at end of class today (or find on web if you aren’t here) No time limit, but its not a research project. About 5 hours should be plenty. Turn in before 5:00pm on Monday 10 Dec 5 December 2001 University of Virginia CS 558 3 Final Question Design GovNeT – a secure internet To get an “A” convince me I wouldn’t be inclined to move to Canada if you are appointed chief architect of GovNeT. Your answers are technically sound, well described and clear. 5 December 2001 University of Virginia CS 558 4 What next? Short Term Avi Rubin Olsson 120, Thursday, 20 Dec at 10:30am “Publius: A robust, tamper-evident, censorship-resistant web publishing system” A bit like the Retspan/Padster system from 7 Nov Manifest Still time to recruit College students for CS200 5 December 2001 University of Virginia CS 558 5 What next? Long Term (Graduating 4th Years) Get a cool security job Companies in Virginia/DC: Cigital, Ernst & Young, NSA Companies further away: Counterpane, RSA, @Stake, CheckPoint, VeriSign, Cryptography 5 December 2001 University of Virginia CS 558 6 What next? Long Term (Non-graduating students) Do research project I will supervise (and possibly fund over summer) projects on security, programming languages, swarm computing If you want me as your TCC advisor, you need to start working with me before February Look for course on secure programming in Fall 2002 5 December 2001 University of Virginia CS 558 7 Thanks! 5 December 2001 University of Virginia CS 558 8 Jeopardy 5 December 2001 University of Virginia CS 558 9 Jeopardy Rules $1Q, $2Q, $4Q – raise hand to answer, first team spotted will be asked to answer, whoever is picked must answer right away Lose value for wrong answer. All teams answer $10Q questions, answer value at complete discretion of judges After all questions, there will be Final Jeopardy Team with the highest total, gets prizes (don’t get cash) 5 December 2001 University of Virginia CS 558 10 Prizes: Top Team Simon Singh, “Fermat’s Enigma” Author of “The Code Book” Neal Stephenson, “Cryptonomicon” Describes a low-tech card cipher Stephen Ambrose, “Undaunted Courage” How to manage research projects “Surely You’re Joking, Mr. Feynman” Stories about our favorite quantum safecraker 5 December 2001 University of Virginia CS 558 11 CS588 Jeopardy Ciphers Aliases Shameless SelfPromotion Cryptographic Protocols Projects 1 1 1 1 1 2 2 2 2 2 4 4 4 4 4 10 10 10 10 Final Jeopardy (All values in $Quadrillions) Ciphers 1 Yjq kpxgpvgf vjku ekrjgt? 5 December 2001 University of Virginia CS 558 13 Ciphers 1 Who invented this cipher? Choices Julius Ceasar Return 5 December 2001 University of Virginia CS 558 14 Buffer 5 December 2001 University of Virginia CS 558 15 Ciphers 2 Kv xmmv a qjuhhgy glpiju? 5 December 2001 University of Virginia CS 558 16 Ciphers 2 Is this a perfect cipher? No (because of spaces) Yes (encrypted with Choices random one-time pad) Return 5 December 2001 University of Virginia CS 558 17 Buffer 5 December 2001 University of Virginia CS 558 18 Ciphers 4 Who won this weird art object by being named Flemish personalities of the year? Choices 5 December 2001 University of Virginia CS 558 19 Ciphers 4 Who won this weird art object by being named Flemish personalities of the year? 5 December 2001 A. Alice Rijn and Bob Dael B. Joan Daemen and Vincent Rijmen C. Eric Rijnem and Marc Daeren D. Michaël Goosens and Sven Vermat University of Virginia CS 558 20 Ciphers 4 Who won this weird art object by being named Flemish personalities of the year? 5 December 2001 A. Alice Rijn and Bob Dael B. Joan Daemen and Vincent Rijmen C. Eric Rijnem and Marc Daeren D. Michaël Goosens and Sven Vermat University of Virginia CS 558 21 Buffer 5 December 2001 University of Virginia CS 558 22 Ciphers 10 In order, what are the 10 most common letters in typical English? 5 December 2001 University of Virginia CS 558 23 Return Ciphers 10 In order, what are the 10 most common letters in typical English? E T A O I N S H R D (L U) David Copperfield etaoinhsrdlmuwycfgpbvkxjqz Pride and Prejudice etaonihsrdlumcyfwgbpvkzxjq Wuthering Heights etaonihsrdlumcyfgwpbvkxjqz Gulliver's Travels etoanisrhdlumcfwygpbvkxjqz Alice in Wonderland etaoihnsrdluwgcymfpbkvqxjz British Corpus etaoinsrhldcumfpgwybvkxjqz (90M UK English) Brown Corpus etaoinsrhldcumfpgwybvkxjqz (1M words of US English) 5 December 2001 University of Virginia CS 558 24 Buffer 5 December 2001 University of Virginia CS 558 25 Aliases 1 Who didn’t violate the terms of his parole to play a CIA cryptography expert on the ABC TV show “Alias”? 5 December 2001 University of Virginia CS 558 26 Aliases 1 Kevin Mitnick The famed computer hacker Kevin Mitniick, who eluded police, U.S. Marshals and FBI agents for over two years before finally being caught makes a guest appearance as a CIA computer specialist. Mitnick was released from prison in January, 2000, and is on supervised release until January, 2003, during which time he is prohibited from using computers without the permission of the U.S. government. “Alias” producers have been working closely with Mitnick’s probation officer to ensure only prop computers are used in the filming of his scenes. Return 5 December 2001 University of Virginia CS 558 27 Buffer 5 December 2001 University of Virginia CS 558 28 Aliases 2 Avi Rubin’s talk on Dec 20th is about a censor-resistant publishing system called “Publius”. Who used “Publius” as an alias? (2 out of 3 for correct answer, 1 to save penalty) 5 December 2001 University of Virginia CS 558 29 Aliases 2 Avi Rubin’s talk on Dec 20th is about a censor-resistant publishing system called “Publius”. Who used “Publius” as an alias? Alexander Hamilton, James Madison, and John Jay to publish the Federalist papers in New York Independent Journal to support ratifying the Constitution Return 5 December 2001 University of Virginia CS 558 30 Buffer 5 December 2001 University of Virginia CS 558 31 Aliases 4 Why is the number of this course 588? 5 December 2001 University of Virginia CS 558 32 Aliases 4 500 – higher numbers are better for your resume 88 – number of keys on a standard piano Return 5 December 2001 University of Virginia CS 558 33 Buffer 5 December 2001 University of Virginia CS 558 34 Aliases 10 Explain the following names: (Sometimes a creative “incorrect” answer is better than a dull, correct one.) CFB DES RSA RC6 SHA SSL 5 December 2001 University of Virginia CS 558 35 Aliases 10 CFB DES RSA RC6 SHA SSL Cipher Feedback Mode Data Encryption Standard Rivest, Shamir, Adelman Rivest Cipher (aka Ron’s Code) 6 Secure Hash Algorithm Secure Sockets Layer Return 5 December 2001 University of Virginia CS 558 36 Buffer 5 December 2001 University of Virginia CS 558 37 Shameless Self-Promotion 1 Which of the following have published papers with Dave as an author? A. USENIX Security Symposium B. IEEE Security and Privacy C. Hacker’s Digest D. Hawaii International Conference on System Sciences 5 December 2001 University of Virginia CS 558 38 Shameless Self-Promotion 1 Which of the following have published papers with Dave as an author? A. USENIX Security Symposium B. IEEE Security and Privacy C. Hacker’s Digest D. Hawaii International Conference on System Sciences 5 December 2001 University of Virginia CS 558 Return 39 Buffer 5 December 2001 University of Virginia CS 558 40 SSP 2 The reason you got slips with your scores on them is that Dave’s algorithms teacher misrecorded his 83 on the midterm as a 38. Who was Dave’s algorithms teacher? 5 December 2001 University of Virginia CS 558 41 SSP 2 The reason you got slips with your scores on them is that Dave’s algorithms teacher misrecorded his 83 on the midterm as a 38. Who was Dave’s algorithms teacher? Ron Rivest 5 December 2001 University of Virginia CS 558 Return 42 Buffer 5 December 2001 University of Virginia CS 558 43 SSP 4 Dave’s thesis project was called “Naccio”. What does the name come from? choices 5 December 2001 University of Virginia CS 558 44 SSP 4 A. B. C. Dave’s thesis project was called “Naccio”. According to http://naccio.cs.virginia.edu/faq.html what does the name come from? Acronym for “Never Again Can Code Inflict Outrage” Extracted from catenaccio, Italian defensive soccer strategy Acronym for “No Acronym Can Cause Instant Ovations” 5 December 2001 University of Virginia CS 558 45 SSP 4 A. B. C. Dave’s thesis project was called “Naccio”. According to http://naccio.cs.virginia.edu/faq.html what does the name come from? Acronym for “Never Again Can Code Inflict Outrage” Extracted from catenaccio, Italian defensive soccer strategy Acronym for “No Acronym Can Cause Instant Ovations” 5 December 2001 University of Virginia CS 558 46 http://naccio.cs.virginia.edu/faq.html Naccio is extracted from catenaccio, a style of soccer defense popularized by Inter Milan in the 1960s. Catenaccio sought to protect the Inter net from attacks, by wrapping potential threats with a marker and agressively removing potentially dangerous parts (that is, the ball) from attackers as soon as they cross the domain protection boundary (also know as the midfield line). Return 5 December 2001 University of Virginia CS 558 47 Buffer 5 December 2001 University of Virginia CS 558 48 SSP 10 Who of the following (on next slide) had an office on the 5th floor of NE43 while Dave was a grad student there? Tiebreak: where were others 2nd tiebreak: which one was on his Dleague hockey team, the “Halting Problems” 5 December 2001 University of Virginia CS 558 49 SSP 10 Who of the following had an office on the 5th floor of NE43 while Dave was a grad student there? (tiebreak: where were others; 2nd tiebreak: which one was on his D-league hockey team) Stephanie Forrest (computer immunology) Butler Lampson (lead designer of first PC, Xerox Alto) J. C. R. Licklider (Internet visionary) Barbara Liskov (first language with good type-safe data abstractions) Robert Morris, Jr. (author of 1988 Internet Worm) Ron Rivest (RSA) Jerome Saltzer (Multics security) 5 December 2001 University of Virginia CS 558 50 SSP 10 Who of the following had an office on the 5th floor of NE43 while Dave was a grad student there? (tiebreak: where were others; 2nd tiebreak: which one was on his D-league hockey team) Stephanie Forrest (computer immunology) On 6th floor, and in New Mexico. Butler Lampson (leader of first PC, Xerox Alto) J. C. R. Licklider (Internet visionary) Died in 1990. Barbara Liskov (first language with good type-safe data abstractions) Robert Morris, Jr. (author of 1988 Internet Worm) Ron Rivest (RSA) On 3rd floor. Jerome Saltzer (Multics security; principles paper) 5 December 2001 University of Virginia CS 558 Return 51 Buffer 5 December 2001 University of Virginia CS 558 52 Cryptographic Protocols 1 How many messages are transmitted in SSL to establish a session key? 5 December 2001 University of Virginia CS 558 53 Cryptographic Protocols 1 SSL (Secure Sockets Layer) 3 Client Server Hello KRCA[Server Identity, KUS] Check Certificate using KUCA Pick random K KUS[K] Find K using KRS Secure channel using K 1 Oct 2001 5 December 2001 University of Virginia CS 588 University of Virginia CS 558 10 54 Bonus Question (+2) What movie is Roger Ebert reviewing below? “In case you’re wondering, the German sub on display at the Museum of Science and Industry in Chicago is U-505, and it was boarded and captured not by submariners, but by sailors from the USS Pillsbury, part of the escort group of the carrier USS Guadalcanal. No Enigma machine was involved. That was in 1944. An Enigma machine was obtained on May 9, 1941, when HMS Bulldog captured U-110. On Aug. 23, 1941, U-570 was captured by British planes and ships, without Enigma. This fictional movie about a fictional U.S. submarine mission is followed by a mention in the end credits of those actual British missions. Oh, the British deciphered the Enigma code, too. Come to think of it, they pretty much did everything in real life that the Americans do in this movie.” 5 December 2001 University of Virginia CS 558 55 Bonus Question (+2) “In case you’re wondering, the German sub on display at the Museum of Science and Industry in Chicago is U-505, and it was boarded and captured not by submariners, but by sailors from the USS Pillsbury, part of the escort group of the carrier USS Guadalcanal. No Enigma machine was involved. That was in 1944. An Enigma machine was obtained on May 9, 1941, when HMS Bulldog captured U-110. On Aug. 23, 1941, U-570 was captured by British planes and ships, without Enigma. This fictional movie about a fictional U.S. submarine mission is followed by a mention in the end credits of those actual British missions. Oh, the British deciphered the Enigma code, too. Come to think of it, they pretty much did everything in real life that the Americans do in this movie.” 5 December 2001 Roger Ebert’s review of U-571 University of Virginia CS 558 Return56 Buffer 5 December 2001 University of Virginia CS 558 57 Cryptographic Protocols 2 Oblivious-transfer coin toss from Lecture 15: Yossarian’s channel (50% pass through) Alice Bob Pick b = b1 b2 … bn b1, b2, …, bn Bob wins if g = b b1, X, X, b4, b5 , …, bn-1 , X g Guess g b1, b2, …, bn Checks the bi she knows match Calculates b = b1 b2 … bn How big must n be to make the chance Alice can get away with cheating < 50%? 5 December 2001 University of Virginia CS 558 58 Cryptographic Protocols 2 Oblivious-transfer coin toss from Lecture 15: Yossarian’s channel (50% pass through) Alice Bob Pick b = b1 b2 … bn b1, b2, …, bn Bob wins if g = b b1, X, X, b4, b5 , …, bn-1 , X g Guess g b1, b2, …, bn Checks the bi she knows match Calculates b = b1 b2 … bn Its impossible! Alice only has to change one bit to cheat, and there is always at 50% chance Bob doesn’t have that bit. 5 December 2001 University of Virginia CS 558 59 Return Buffer 5 December 2001 University of Virginia CS 558 60 Cryptographic Protocols 4 What is the world’s most watched regularly occurring event that is not a soccer game? Hint 5 December 2001 University of Virginia CS 558 61 Cryptographic Protocols 4 What is the world’s most watched regularly occurring event that is not a soccer game? The only US broadcast was called “El Gran Sorteo” ~1Billion people worldwide watched it last Saturday. 5 December 2001 University of Virginia CS 558 62 Cryptographic Protocols 4 What is the world’s most watched regularly occurring event that is not a soccer game? World Cup Draw (cryptographic protocol involving picking balls out of pots) 5 December 2001 University of Virginia CS 558 Return 63 Buffer 5 December 2001 University of Virginia CS 558 64 Cryptographic Protocols 10 Put these in order of increasing value: A. Damage done by ILoveYou Virus B. VeriSign’s valuation (noon today) C. NSA annual budget D. Amount Bill Gates’ Foundation is giving away E. GDP of Ireland in 1998 5 December 2001 University of Virginia CS 558 65 Cypherpunks 10 A. B. C. D. E. Damage done by ILoveYou Virus (~$10B) VeriSign’s valuation (~$8.3B) NSA annual budget (probably $3B-15B, not public) Amount Bill Gates’ Foundation is giving away ($21B) GDP of Ireland in 1998 ($67B) Answer: B A D E (C somewhere between 1st and 4th) Return 5 December 2001 University of Virginia CS 558 66 Buffer 5 December 2001 University of Virginia CS 558 67 Projects 1 [Team 3] In Team 3’s hash-based authentication scheme, how does the Mote check is Command is valid? M = E(Command || Xi) Mote decrypts M, Checks ? Then stores Xi in place of Xi-1 5 December 2001 Generates Xn; Calculates key Chain: H(Xn) = X n-1 … H(X1)= X0 University of Virginia CS 558 68 Projects 1 [Team 3] In Team 3’s hash-based authentication scheme, how does the Mote check is Command is valid? M = E(Command || Xi) Mote decrypts M, Checks H(Xi) = Xi-1 Then stores Xi in place of Xi-1 5 December 2001 Generates Xn; Calculates key Chain: H(Xn) = X n-1 … H(X1)= X0 University of Virginia CS 558 Return69 Buffer 5 December 2001 University of Virginia CS 558 70 Projects 2 [Team 2] The next slide shows a Chess position and key. What letter is encoded? 5 December 2001 University of Virginia CS 558 71 Key = 101010 Alphabet A = 000001 = 1 B = 000010 = 2 C = 000011 = 3 … Z = 011010 = 26 5 December 2001 University of Virginia CS 558 72 Key = 101010 Alphabet A = 000001 = 1 B = 000010 = 2 C = 000011 = 3 … Z = 011010 = 26 1 1 0 0 1 0 XOR 1 0 1 0 1 0 = 011000 = 24 = X Return Buffer 5 December 2001 University of Virginia CS 558 74 Projects 4 (anyone can answer) Who (according to a literal interpretation of the SEAS patent policy) owns all the original ideas you developed for your projects, problem sets and the take-home final? 5 December 2001 University of Virginia CS 558 75 Projects 4 Who (according to a literal interpretation of the new SEAS patent policy) owns all the original ideas you developed for your projects, problem sets and the take-home final? UVA Patent Foundation 5 December 2001 University of Virginia CS 558 76 New SEAS Patent Policy This Policy also applies to and binds all undergraduate and graduate students and others engaged in research at UVA as a condition of their participation in such research, irrespective of whether such participation is full-time or part-time, for class credit or not, or whether they are paid for such participation. Inventions that are made in the course of research carried out at UVA, made using funds administered by UVA, or otherwise made through the use of significant UVA resources not available to the public are the exclusive property of UVA. 5 December 2001 University of Virginia CS 558 77 Final Jeopardy: Quantum Key Distribution 5 December 2001 University of Virginia CS 558 78 Alice transmits a shared key to Bob, Colleen and Doug using Bennet’s QKD scheme, sending identical spinning photons to each person. Eve intercepts all 3 streams. What is the probability Eve can determine a single transmitted bit without getting caught? Good answer must describe what Eve does and the probability she will succeed Assume Alice, Bob, Colleen and Doug have a prefect mechanism for determining if they all have the same key after the transmission. 5 December 2001 University of Virginia CS 558 79