CSE 484 Midterm Review “1st half of the quarter in 5 slides”

Slides:



Advertisements
Similar presentations
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Advertisements

ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Chapter 5 Cryptography Protecting principals communication in systems.
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
Modes of Operation CS 795. Electronic Code Book (ECB) Each block of the message is encrypted with the same secret key Problems: If two identical blocks.
Hash Functions Nathanael Paul Oct. 9, Hash Functions: Introduction Cryptographic hash functions –Input – any length –Output – fixed length –H(x)
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
CS 4/585: Cryptography Tom Shrimpton FAB
CS426Fall 2010/Lecture 401 Computer Security CS 426 Review for Final Exam.
CMSC 414 Computer and Network Security Lecture 5 Jonathan Katz.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
BLOCK CIPHER SYSTEMS OPERATION MODES OF DATA ENCRYPTION STANDARD (DES)
Modes of Usage Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) 11 Coming up: Modes of.
CS426Fall 2010/Lecture 61 Computer Security CS 426 Lecture 6 Cryptography: Message Authentication Code.
Class 3 Cryptography Refresher II CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Exam 1 Review CS461/ECE422 Fall Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like.
Class 3 Cryptography Refresher II CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
CS426Fall 2010/Lecture 51 Computer Security CS 426 Lecture 5 Cryptography: Cryptographic Hash Function.
CS555Spring 2012/Topic 151 Cryptography CS 555 Topic 15: HMAC, Combining Encryption & Authentication.
Message Authentication Codes CSCI 5857: Encoding and Encryption.
Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
CS555Spring 2012/Topic 141 Cryptography CS 555 Topic 14: CBC-MAC & Hash Functions.
Block Cipher Modes Last Updated: Aug 25, ECB Mode Electronic Code Book Divide the plaintext into fixed-size blocks Encrypt/Decrypt each block independently.
Symmetric-Key Cryptography CS 161: Computer Security Prof. Raluca Ada Popa Sept 13, 2016.
Practical Aspects of Modern Cryptography Josh Benaloh & Brian LaMacchia.
CS/ECE 578 Cyber-Security Dr. Attila Altay Yavuz
Computer Security Revision Week
Cryptography Aalto University, autumn 2013.
CS/ECE Network Security Dr. Attila Altay Yavuz
Symmetric Cryptography
IT443 – Network Security Administration Instructor: Bo Sheng
CSCE 715: Network Systems Security
Public Key Encryption and Digital Signatures
Network Security.
Exam Review.
STRATEGIC ENCRYPTION
Introduction to modern cryptology
Block Cipher Modes CS 465 Make a chart for the mode comparisons
Cryptographic Hash Functions Part I
Cryptography Lecture 13.
MAC: Message Authentication Code
Cryptography Basics and Symmetric Cryptography
Cryptography and Security Fall 2009 Steve Lai
CS 465 Buffer Overflow Slides by Kent Seamons and Tim van der Horst
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Cryptography Lecture 10.
Asymmetric Cryptography
Security through Encryption
CS/ECE 478 Network Security Dr. Attila Altay Yavuz
Introduction to Symmetric-key and Public-key Cryptography
Foundations of Network and Computer Security
Security Of Wireless Sensor Networks
Symmetric-Key Encryption
Network Security.
Block Ciphers (Crypto 2)
Security of Wireless Sensor Networks
Cryptography Lecture 12.
Homework #1 Chap. 1, 3, 4 J. H. Wang Oct. 2, 2018.
Topic 13: Message Authentication Code
Lecture 4.1: Hash Functions, and Message Authentication Codes
Cryptography Lecture 14.
Cryptography Lecture 13.
Cryptography Lecture 9.
Cryptography Lecture 13.
CRYPTOGRAPHY & NETWORK SECURITY
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

CSE 484 Midterm Review “1st half of the quarter in 5 slides” A.K.A. things you should have learned, had you not slept through your alarm, not fallen asleep in class, had been paying attention in class, and had been reading your book.

Intro, risk analyses, ethics The Security Mindset Threat models, security goals, assets, risks, adversaries -> be able to analyze situations. Goals: Confidentiality/privacy, integrity, authenticity, availability Example: e-voting

Software security: Issues and attacks Smashing stack Off-by-one Heap Function pointers Format strings Integer overflow Randomness Timing attacks

Software security: Defenses Safe languages Non-executable stack (NX bit) Doesn’t protect against: return-to-libc, heap/function pointer attacks, changing stack internal vars (auth flags) Randomize stack Encrypt return address Source code static analysis Run time checking tools (stackguard) Black-box testing,

Crypto What is it? What is symmetric crypto? Asymmetric? What is Privacy? What is Integrity? What’s a MAC? What’s a block cipher? Stream cipher? Hash function? What’s a one-time-pad? Is it secure? Why? Disadvantages: integrity, key distribution, key size What is what: AES, DES, MD5, OTP, HMAC What is ECB mode? Weaknesses? What is CBC mode? CTR mode?

More Crypto What can we attack about a cipher (always know encryption scheme) Ciphertext only, known-plaintext, chosen-plaintext, chosen-ciphertext. Hash functions What is one-wayness? What is collision-resistance? Weak vs. Strong How are Unix passwords stored? Common hashes: md5, sha-1

Some suggestions Read the slides Do last year’s midterm except for 3, 4, 5. … Open the book