Class home page


Unlike DES, operates on whole bytes for efficiency of software implementations



Yüklə 501 b.
səhifə5/12
tarix03.08.2018
ölçüsü501 b.
#66903
1   2   3   4   5   6   7   8   9   ...   12

Unlike DES, operates on whole bytes for efficiency of software implementations

  • Key sizes: 128/192/256 bits

  • Variable rounds: 9/11/13 rounds

  • More details on structure in the applied cryptography class.



  • Key size is enough



    Currently of theoretical interest only

    • Currently of theoretical interest only

    • Still, uncomfortably close to feasibility

      • DES is already insecure against brute force
      • Schneier (somewhat arbitrarily) sets limit at 280
    • Certainly usable pending further results





    Who discovered MouseJack? Marc Newlin, a member of Bastille’s Threat Research Team.  

    • Who discovered MouseJack? Marc Newlin, a member of Bastille’s Threat Research Team.  

    • Is there a MouseJack fix? A MouseJack fix is the responsibility of the device manufacturers. Consumers should check with their vendors to see if a fix exists. If a fix does not exist, consumers should consider replacing their device with a secure one.

    • Remediation

    • Immediately disconnect all affected USB dongles, and use wired keyboards and mice instead.

    • If you are using affected Logitech or 'Lenovo 500' devices, please update your firmware by referring to the appropriate instructions.

    • Tools The Bastille Threat Research Team is releasing free, open source tools to enable interested parties to discover wireless mice and keyboards that may be vulnerable to MouseJack.

    • GitHub





    Class home page

    • Class home page

      • http://ccss.usc.edu/530
    • Assignment 1 is due Wednesday

    • Paper proposals due 28 September



    This Fall, NSA is launching its 4th annual Codebreaker Challenge. It is a hands-on software reverse engineering challenge where students work to complete mission-focused objectives to push their school to the top of the competition leaderboard.

    • This Fall, NSA is launching its 4th annual Codebreaker Challenge. It is a hands-on software reverse engineering challenge where students work to complete mission-focused objectives to push their school to the top of the competition leaderboard.

    • The theme for this year's challenge is "countering Improvised Explosive Devices (IEDs)". Students are given six tasks of increasing difficulty that culminate in developing the capability to permanently disable fictional IED software in a fictional scenario. Feedback from previous challenges indicated students learned a great deal from participating

    • Here are the pertinent details:

    • The challenge will be hosted at https://codebreaker.Ltsnet.net

    • The challenge begins 9 September 9 pm ET & ends 31 December 2016

    • Students should register on the site using their .edu email addresses

    • Links to software reverse engineering lectures and other educational material can be found on the site.



    aka asymmetric cryptography



    Why are public keys (and private keys) so large?

    • Why are public keys (and private keys) so large?

    • What is the probability that some large number p is prime?

      • About 1 in 1/ln(p)
      • When p ~ 2512, equals about 1 in 355
        • About 1 in 3552 numbers ~ 21024 is product of two primes (and therefore valid RSA modulo)


    Rivest, Shamir, Adleman

    • Rivest, Shamir, Adleman

    • Generate two primes: p, q

      • Let n = pq
      • Choose e, a small number, relatively prime to (p-1)(q-1)
      • Choose d such that ed = 1 mod (p-1)(q-1)
    • Then, c = me mod n and m = cd mod n



    Let p = 5, q = 11, e = 3

    • Let p = 5, q = 11, e = 3

      • Then n = 55
      • d = 27, since (3)(27) mod 40 = 1
    • If m = 7, then c = 73 mod 55 = 343 mod 55 = 13

    • Then m should = 1327 mod 55



    Computing 1327 mod 55

    • Computing 1327 mod 55

      • 131 mod 55 = 13, 132 mod 55 = 4, 134 mod 55 = 16, 138 mod 55 = 36, 1316 mod 55 = 31
      • 1327 mod 55 = (13)(4)(36)(31) mod 55 = (1872 mod 55)(31) mod 55 = 62 mod 55 = 7 (check)



    Yüklə 501 b.

    Dostları ilə paylaş:
    1   2   3   4   5   6   7   8   9   ...   12




    Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
    rəhbərliyinə müraciət

    gir | qeydiyyatdan keç
        Ana səhifə


    yükləyin