Master and PhD examples Prof. Yvo Desmedt Department of Computer Science Florida State University, USA www.cs.fsu.edu/~desmedt Partially funded by NSF.

Slides:



Advertisements
Similar presentations
Chapter 2: Digital Modulation
Advertisements

Information Hiding and Covert Channels
Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr.
Analog Transmission : Data Communication and Computer Networks Asst. Prof. Chaiporn Jaikaeo, Ph.D.
Computer Communication & Networks Lecture # 06 Physical Layer: Analog Transmission Nadeem Majeed Choudhary
1 Computer Communication & Networks Lecture 7 Physical Layer: Analog Transmission Waleed Ejaz
DIGITAL COMMUNICATIONS.  The modern world is dependent on digital communications.  Radio, television and telephone systems were essentially analog in.
Steganography Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even.
Secure communication Informatics for economists II Jan Přichystal
1 Computer Engineering Department College of Computer Sciences and Engineering Tuesday 18 November 2008 King Fahd University of Petroleum & Minerals.
All rights reserved © 2005, Alcatel Risk Awareness in Enterprise IT Processes and Networks  Dr. Stephan Rupp.
Chapter 17 Controls and Security Measures
FIT3105 Smart card based authentication and identity management Lecture 4.
FIT5037 Advanced Network Security --- Modern Computing and Security --- Lecture 1.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
3-2008UP-Copyrights reserved1 ITGD4103 Data Communications and Networks Lecture-9: Communication Techniques,Spectrum and bandwidth week 10- q-2/ 2008 Dr.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Chapter 2, Exploring the Digital Domain
March 8, 2006  Yvo Desmedt Robust Operations Research II: Production Networks by Yvo Desmedt University College London, UK.
HOMMER: Holistic Model for Minority Education & Research “The Balancing Act”: Accountability vs. Privacy by Deidre W. Evans Christy L. Chatmon Department.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
   Yvo Desmedt October 31, 2002 SECURITY PROBLEMS WITH ON-LINE REVOCATION By Yvo Desmedt Dept. Of Computer Science Florida State University
Overview IS 8040 Data Communications Dr. Hoganson Course Overview Sending signals over a wire –Data: bits – binary (0/1) –How to transmit the digital data:
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Aggregation in Sensor Networks
Digital Steganography
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Physics 1251 The Science and Technology of Musical Sound Unit 4 Session 37 MWF Synthesizers Unit 4 Session 37 MWF Synthesizers.
ECEN 621, Prof. Xi Zhang ECEN “ Mobile Wireless Networking ” Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings,
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
E-Commerce Course Overview. Telephone Network Connection-based Admission control Intelligence is “in the network” Traffic carried by relatively few, “well-known”,
Information Hiding & Digital Watermarking Tri Van Le.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Agder University Faculty of Engineering and Science ICT Department Head of ICT Department Prof. A. Prinz.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
``Chaffing and Winnowing’’ & Crypto Policy Comments Ronald L. Rivest Cryptography and Information Security Group MIT Lab for Computer Science April 1998.
Computer Forensics, Steganography and Cryptography and Related Ethical Issues. Edilasio Pereira Russell Braun Team 8.
Michele Mosca Canada Research Chair in Quantum Computation 27 May 2006 Introduction to quantum technologies: quantum computers, quantum teleporters & cryptography.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
5.1 Chapter 5 Analog Transmission Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
An Easy Method to Implement Audio Cryptography Schemes without Computing Devices Shin Yan Chiou and Chi Sung Laih Department of Electrical Engineering,
STEGANOGRAPHY Sonya Febiatiningsih ( ) for further detail, please visit
Comments on Networking and Security - Challenges for Environmental Observatories Arthur C. Sanderson Rensselaer Polytechnic Institute NSF Workshop on Cyberinfrastructure.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
Presented by Prof. Danilo Gligoroski MSc in Telematics Specialization in Information Security.
©Brooks/Cole, 2003 Chapter 16 Security. ©Brooks/Cole, 2003 Define four aspects of security in a network: privacy, authentication, integrity, and nonrepudiation.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
SECURITY IN MOBILE NETWORKS Bharat Bhargava CERIAS and Computer Sciences Departments Purdue University, W. Lafayette, IN Supported.
1 Item 3 - Research and Development of High Security Remote Authentication Technology Item 3 - Research and Development of High Security Remote Authentication.
Information Hiding & Digital Watermarking Tri Van Le.
CS 591 S1 – Computational Audio – Spring 2017
ppt 0n phase Shift Oscillator
E-Commerce: Doing Business on the Internet
Information Security at Florida State University
Information Security at Florida State University
International Collaboration Project on Information Security
Chapter 5 Analog Transmission
Encryption, Cryptography, and Steganography:
Information Security at Florida State University
Information Security at Florida State University
Anonymity - Background
Developing a Versatile Audio Synthesizer TJHSST Computer Systems Lab
A Novel Secret Sharing Scheme from Audio Perspective
Information Hiding & Digital Watermarking
Some New Issues on Secret Sharing Schemes
Presentation transcript:

Master and PhD examples Prof. Yvo Desmedt Department of Computer Science Florida State University, USA Partially funded by NSF and DARPA  by Yvo Desmedt

A. General interests B. Master thesis: examples: 1. Computer viruses 2. Information Hiding and Cryptography C. PhD thesis: examples: Threshold cryptography

A. General interests 1. Cryptography: –Classical topics: Authenticity, Integrity, Privacy –Modern topics: anonymity broadcast privacy protecting against insiders, e.g. –when a company is signing –protecting copyright law enforcement …

A. General interests 2. Computer Security: –Computer viruses –Information hiding –Secure distributed computation –Survivable computers

A. General interests 3. Network Security: –PKI –Security and Reliability in: non-point-to-point networks in unknown networks wireless

B. Master thesis: examples: 1. Computer viruses: platform independent computer virus: written in LaTeX/emacs: Student: K. McMillan 2. Information Hiding and Cryptography Students: S. Hou and T. V. Le Presented at: Asiacrypt 98, Information Hiding 99

B. Master thesis: Information Hiding Motivation: History: steganography: older than cryptography? Importance of modern steganography: –Bypass key escrow –Protect privacy –Achieve some form of anonymity –Protect freedom of expression –Facilitate spies to communicate –…

B. Master thesis: Information Hiding Current security of steganography –low to poor –requires complex computer programs Security goals: –Privacy: unconditional –Steganography: warden=human without computer –Key: must also be steganographic Implementation goal: –Decryption: without computer

B. Master thesis: Information Hiding Audio cryptography: binary case: –Sound (and also light!) is a wave. This implies that a wave can cancel another one provided these are 180 degrees out of phase. –Note: for light this has been called: Optical Cryptography: however expensive equipment is needed to realize this. –Cover: e.g., music –Demo:

B. Master thesis: Information Hiding Audio cryptography: non-binary case: Simulated output: this is the method to use when there is no analog mixer and amplifier: Modular Amplitude Method: share 1, share 2, simulated sum Phase Shifting Method: share 1, share 2, simulated sum Frequency Flipping Method: share 1, share 2, simulated sum

C. PhD thesis: examples: Threshold cryptography Students: Y. Frankel and B. King Allows, e.g. company to sign instead of a single individual. For more details: see: Several publications