CS588: Cryptology - Principles and Applications, Fall 2001 |
Manifest: Monday 8 October 2001
Assignments Due Wednesday, 10 October Problem Set 3 Wednesday, 17 October No Class Wednesday, 24 October Midterm
Questions
- How can two parties communicate on a network without revealing they are communicating?
- When is it safe to run a program from an untrusted source?
- What is the relationship between authentication and access control?
- What are three general ways to authenticate someone?
- What are some problems with early password schemes?
- How can systems authenticate users without storing their passwords?
Links
- Onion Routing project at NRL
- Anonymous Remailers
- Password Security: A Case History, Robert Morris and Ken Thompson, Communications of the ACM, 1979. This paper describes UNIX passwords circa 1979. They claim, "The use of encrypted passwords appears reasonably secure in the absence of serious attention of experts in the field." Later in the course we'll read about the Morris Worm, created by Robert Morris Sr.'s son, Robert Morris, Jr.
- UNIX Password Security - Ten Years Later, David Feldmeier and Philip Karn, Crypto '89. An update to the Morris-Thompson paper.
- L0phtcrack
- SSH home page
University of Virginia Department of Computer Science CS 588: Cryptology - Principles and Applications |
David Evans evans@virginia.edu |