-
Notifications
You must be signed in to change notification settings - Fork 184
/
Copy pathlectures1-17.aux
152 lines (152 loc) · 13.3 KB
/
lectures1-17.aux
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
\relax
\@writefile{toc}{\contentsline {section}{\tocsection {}{1}{Introduction to Cryptography}}{1}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{2}{Security Policies}}{1}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{2.1}{Examples}}{1}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{2.2}{Types of Policies}}{1}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{3}{Security Mechanisms}}{1}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{4}{Adversaries}}{2}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{5}{Vulnerability}}{2}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{6}{Introduction to Cryptography}}{3}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{6.1}{Security Mechanisms}}{3}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{6.2}{Principles}}{3}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{7}{Growth of Cryptography}}{3}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{7.1}{Early Cryptography}}{3}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{7.2}{World War I}}{3}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{7.3}{Alan Turing}}{4}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{7.4}{Claude Shannon}}{4}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{7.5}{DES - U.S. Data Encryption Standard}}{4}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{7.6}{Computational Complexity}}{4}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{8}{Public Key Cryptography}}{4}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{8.1}{RSA (Rivest, Shamir, Adleman 1977)}}{4}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{8.2}{Digital Certificates}}{4}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{8.3}{RC4 Stream Cipher}}{4}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{8.4}{MD5 Hash}}{4}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{8.5}{World Wide Web}}{4}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{9}{Growth of Cryptography - Continued}}{5}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{9.1}{Zero Knowledge Proofs}}{5}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{9.2}{Micro Payments}}{5}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{9.3}{Voting Systems}}{5}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{9.4}{Fully Homomorphic Encryption}}{5}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{10}{Encryption and One Time Pads}}{5}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{10.1}{Notion of Encryption}}{5}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{10.2}{One Time Pad (Vernam 1917)}}{6}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{10.3}{Proof of Security}}{6}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{11}{One Time Pad}}{7}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{12}{Generating Randomness}}{7}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{13}{Cryptographic Hash Functions}}{7}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{13.1}{Examples}}{7}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{13.2}{Random Oracle Model (ROM)}}{7}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{13.3}{Properties}}{8}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{13.4}{Applications}}{8}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{14}{Hash Function Applications}}{9}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{14.1}{Password Storage}}{9}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{14.2}{File Modification Detector}}{9}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{14.3}{Digital Signatures (hash and sign)}}{9}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{14.4}{Commitments}}{9}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{14.5}{Merkle Tree}}{9}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{15}{Merkle-Damgard Construction}}{9}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{16}{Keccak}}{10}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{17}{The Web}}{11}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{17.1}{HTTP Request}}{11}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{17.2}{HTTP Response}}{11}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{17.3}{Data Content}}{11}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{18}{Web security}}{11}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{18.1}{Authentication}}{11}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{18.2}{Passwords}}{11}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{18.3}{Dictionary Attacks}}{11}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{18.4}{Generating Multiple Client Passwords}}{12}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{18.5}{Cookies}}{12}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{19}{Attacks on Web Applications}}{12}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{19.1}{SQL Injection}}{12}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{19.2}{CSRF: Cross Site Request Forgery}}{12}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{19.3}{XSS: Cross Site Scripting}}{13}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{20}{Buffer Overflow Overview}}{14}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{20.1}{Contents of Memory}}{14}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{20.2}{Stack Frames}}{14}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{20.3}{Consequences of Buffer Overflows}}{14}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{20.4}{Shell Code}}{14}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{20.5}{Return to libc Attack}}{15}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{21}{Buffer Overflow Prevention}}{15}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{21.1}{Canary Values}}{15}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{21.2}{Safe Functions}}{15}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{21.3}{Non-executable Stack}}{15}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{21.4}{Address Space Layout Randomizaion (ASLR)}}{15}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{22}{Overview of Block Ciphers}}{16}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{23}{Data Encryption Standard (DES)}}{16}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{24}{Types of Attacks}}{16}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{24.1}{Differential Analysis}}{16}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{24.2}{Linear Attacks (Matsui)}}{16}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{25}{Advanced Encryption Standard}}{16}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{26}{Ideal Block Cipher}}{17}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{27}{Confidentiality}}{17}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{27.1}{Electronic Code Book (ECB)}}{17}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{27.2}{CTR Mode}}{17}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{28}{Cipher Block Schemes}}{18}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{28.1}{Cipher Block Chaining (CBC)}}{18}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{28.2}{Cipher Feedback Mode (CFB)}}{18}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{29}{Ciphertext Indistinguishability}}{18}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{30}{Unbalanced Fiestel Encryption Mode (UFE)}}{19}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{31}{Message Authentication Codes (MAC)}}{19}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{31.1}{MAC Game}}{19}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{32}{Authentication}}{20}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{32.1}{CBC-MAC}}{20}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{32.2}{PRF-MAC Hash Function}}{20}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{32.3}{Combining MAC and Encryption}}{20}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{33}{EAX Mode: Authenticated Encryption}}{20}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{33.1}{Workings of EAX}}{20}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{34}{Finite Fields}}{21}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{35}{Finite Fields}}{22}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{35.1}{Computing Powers}}{22}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{35.2}{Generate and Test Primes}}{22}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{35.3}{Testing for Primality}}{22}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{36}{One-time MAC}}{22}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{37}{Number Theory}}{23}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{37.1}{Euclid's Algorithm for GCDs}}{23}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{38}{Group Theory}}{24}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{38.1}{Orders of Elts}}{24}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{38.2}{Generators}}{24}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{38.3}{Generate and Test}}{24}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{39}{Public Keys}}{24}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{39.1}{Common Public Key Setup}}{25}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{40}{Group Theory Review}}{26}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{40.1}{Programming with Groups}}{26}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{41}{Diffie-Hellman Key Exchange}}{26}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{42}{Different Types of Groups}}{26}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{42.1}{Elliptic Curves}}{27}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{43}{Pedersen Commitments}}{28}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{43.1}{Commitment Scheme Overview}}{28}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{43.2}{Pedersen Commitment Scheme}}{28}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{43.3}{Security of Pedersen Commitment Scheme}}{28}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{43.4}{Malleability}}{28}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{44}{Public Key Encryption}}{28}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{44.1}{ElGamal Public Key Encryption}}{29}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{44.2}{Security of ElGamal}}{29}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{45}{ElGamal: Malleability and Homomorphisms}}{30}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{45.1}{El Gamal is Homomorphic}}{30}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{46}{IND-CCA2 Security}}{30}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{46.1}{El Gamal and IND-CCA2 Security}}{30}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{47}{Cramer Shoup}}{30}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{48}{RSA}}{31}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{48.1}{Public Key Scheme}}{31}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{48.2}{Keygen for RSA}}{31}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{48.3}{Encryption and Decryption}}{31}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{48.4}{Proof of Correctness}}{31}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{49}{RSA and IND-CCA2 Security}}{32}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{49.1}{The Scheme}}{32}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{49.2}{Decryption}}{32}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{49.3}{IND-CCA2 Security}}{32}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{49.4}{Real World Attacks}}{32}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{50}{Digital Signatures}}{32}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{50.1}{}}{33}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{51}{Hash and Sign}}{34}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{52}{RSA Based Signing}}{34}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{52.1}{PKCS}}{34}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{52.2}{PSS (Probabilistic Signature Scheme)}}{34}}
\@writefile{toc}{\contentsline {section}{\tocsection {}{53}{ElGamal Based Signing}}{34}}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{53.1}{ElGamal Digital Signatures}}{34}}
\newlabel{tocindent-1}{0pt}
\newlabel{tocindent0}{0pt}
\newlabel{tocindent1}{26.76361pt}
\newlabel{tocindent2}{41.25pt}
\newlabel{tocindent3}{0pt}
\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{53.2}{DSS}}{35}}