Cheating Issues in Security and Privacy - PowerPoint PPT Presentation

1 / 12
About This Presentation
Title:

Cheating Issues in Security and Privacy

Description:

Excuse me, I don't like to cheat. What should I do? Stop others from cheating you. ... What do I benefit from this class? It is fun. ( But a lot of work. ... – PowerPoint PPT presentation

Number of Views:96
Avg rating:3.0/5.0
Slides: 13
Provided by: sit9
Category:

less

Transcript and Presenter's Notes

Title: Cheating Issues in Security and Privacy


1
CheatingIssues in Security and Privacy
Start with demo Coin ripping End with
teaser Untransferable proofs
  • Markus Jakobsson
  • www.markus-jakobsson.com

2
What is this course about?
  • Cheating
  • Security
  • Privacy
  • Protocol Analysis
  • Protocol Design

3
What does it take to succeed?
  • Read the book? No. (There is no book.)
  • Get a good score on the final? No. (There is no
    final.)
  • Cheat? Now were getting somewhere!

4
What does it take then?
  • Think creatively? Yes.
  • Understand lecture material? Yes.
  • Read scientific articles? Yes.
  • Implement programs to cheat? Yes.
  • Mathematical skills? That helps.
  • Wanting to win all the time? That, too.

5
More specifically now
  • Follow links in lectures, read articles.
  • Read lecture notes beforehand - and after!
  • Ask questions when you are not sure.
  • Come to office hours.
  • Speak to classmates and AI.

6
How am I graded?
  • 30 Quizzes
  • 20 Take-home (Implementation)
  • 10 Presentation
  • 40 Project (Essay or Implementation)
  • Undergrad grad students graded on separate
    curves.

7
So cheating is allowed?
  • Well not quite only some types.
  • Obvious types of cheating not ok.
  • New and interesting ways good!
  • Can I copy things? Not without citing.
  • Can we collaborate? Sometimes.

8
Excuse me, I dont like to cheat. What should I
do?
  • Stop others from cheating you. But first, you
    have to know how they could cheat you. So you
    have to learn to cheat anyway.

9
And now, for some frequently used words.(Take
notes if you are not already.)
  • Protocol step-by-step description
  • Cheating not following the protocol
  • Security no cheating possible
  • Malicious cheater wants to hurt others
  • Rational cheater wont hurt himself
  • Infeasible/impossible there may be an answer,
    but nobody can find it.

10
and some more words
  • One-way function (easy to compute, hard to
    invert.)
  • Privacy no bad leaks of information
  • Denial of service swamping the victim

11
And on the topic of denial of service
  • Have a question?
  • Ask in class.
  • Ask your friends.
  • Come to my office hours. (The hour before class.)
  • Come to the AIs office hours. (M 1-2, W 11-12)
  • Email the AI, Divya (diaggarw_at_indiana.edu)
  • but please do not email me

12
What do I benefit from this class?
  • It is fun. (But a lot of work.)
  • Security is a hot area. (Negative unemployment.)
  • Security is good to know even for people who
    dont aim to be security experts. (Educated
    buyers.)
  • Bragging rights. (Who else will ask you to
    cheat?)
Write a Comment
User Comments (0)
About PowerShow.com