Beruflich Dokumente
Kultur Dokumente
INTERNSHIP
BY ROWAN BRIGGS
CYBERSECURITY AND ITS TEN DOMAINS
• Importance of Cybersecurity
• Aspects of our lives rely on the Internet and computers
• It is important that we protect information and systems we rely on
• Examples of Threats
• Phishing scams
• Data theft
BITCOIN AND CRYPTOCURRENCY TECHNOLOGY
• By Princeton University
• With:
• Dr. Joseph Bonneau
• Dr. Ed Felten
• Dr. Arvind Narayanan
• And his PhD student: Andrew Miller
WEEK 1: TERMINOLOGY
• Hash Function
• Takes any string
• Fixed size output
• Efficiently computable
WEEK 1: TERMINOLOGY
• Security Properties
• Collision-free
• Hiding
• Puzzle Friendly
WEEK 1: SECURITY PROPERTIES
• Collision-free
• Cannot find x and y such that x != y AND H(x) = H(y)
• Hiding
• Given H(x), it is difficult to find x
• Assuming r is chosen from a random distribution then given: H(r|x), x is not findable
• This creates: Commitment
WEEK 1: HIDING-COMMITMENT
• Essentially:
• H(key|msg) != H(key|msg’)
WEEK 1: SECURITY PROPERTIES
• Puzzle-friendly
• For every possible y:
• If k is chosen from a distribution then it is infeasible to find x such that:
• H(k|x) = y
WEEK 1: DATA STRUCTURES
• By Stanford University
• Dr. Dan Boneh
WEEK 1: CRYPTOGRAPHY
• Steps in Cryptography
• Precisely specify threat model
• Propose a construction
• Prove that breaking construction under threat mode will solve an underlying hard problem
WEEK 1: CRYPTOGRAPHY
• Advantages of OTP
• First example of a “secure” cipher
• Fast
• Disadvantages of OTP
• Long keys
• Hard to Use
• Message can be modified
• Cybersecurity is important
• XOR