Dr. Gerald Kruse, Ph.D. John ‘54 and Irene ‘58 Dale Professor of MA, CS, and IT Assistant Provost Juniata College

Slides:



Advertisements
Similar presentations
Chapter 10 Fine-tuning, Completing, and Publishing Your Project.
Advertisements

Cryptography and Network Security Chapter 9
CSC 774 Advanced Network Security
Digital Signatures. Anononymity and the Internet.
 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Presented by Kelly Edwards CEO of Lawton Marketing Group and Prime Agent Marketing.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Great Theoretical Ideas in Computer Science.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Professor Jennifer Rexford COS 217
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
The Internet & The World Wide Web Notes
]. Website Must-Haves Know your audience Good design Clear navigation Clear messaging Web friendly content Good marketing strategy.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Bob can sign a message using a digital signature generation algorithm
March 14, Microsoft Microsoft officially announced the date and time that Internet Explorer 9 (IE9) will move away from a release candidate and.
Cryptography Programming Lab
MATH 224 – Discrete Mathematics
Google’s Billion Dollar Eigenvector Gerald Kruse, PhD. John ‘54 and Irene ‘58 Dale Professor of MA, CS and I T Interim Assistant Provost Juniata.
Chapter 17: Information Science Lesson Plan
Sue Center A communication environment for people who cannot use a normal keyboard or mouse. suecenter.org.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Computer Programming Basics Assistant Professor Jeon, Seokhee Assistant Professor Department of Computer Engineering, Kyung Hee University, Korea.
Algorithms (wait, Math?) Everywhere… Gerald Kruse, PhD. John ‘54 and Irene ‘58 Dale Professor of MA, CS and I T Interim Assistant Provost Juniata.
Informatics Computer School CS114 Web Publishing HTML Lesson 2.
Foundations of Computer Science Computing …it is all about Data Representation, Storage, Processing, and Communication of Data 10/4/20151CS 112 – Foundations.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
Have you ever wanted to hide something from: Your friends? Your family? The Government?
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Information Security Fundamentals Major Information Security Problems and Solutions Department of Computer Science Southern Illinois University Edwardsville.
1 i206: Lecture 2: Computer Architecture, Binary Encodings, and Data Representation Marti Hearst Spring 2012.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Tired of Spam? The solution is MailWasher
Information Security and Secret Messages. Agenda Information Assurance Program Value of Information Secret Messages –Steganography –Caesar Cypher –Keyword.
Cryptography Dave Feinberg. Suppose I send an from to Who has access to that ? What if I want the.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Introduction to Image Processing Our first look at image processing will be through the use of Paint Shop Pro, a bitmap editing program available as shareware.
CDA 3100 Spring Special Thanks Thanks to Dr. Xiuwen Liu for letting me use his class slides and other materials as a base for this course.
Lecture 17 Page 1 CS 236 Online Onion Routing Meant to handle issue of people knowing who you’re talking to Basic idea is to conceal sources and destinations.
CSCI-235 Micro-Computers in Science Privacy & Security.
Chapter 1 Algorithms with Numbers. Bases and Logs How many digits does it take to represent the number N >= 0 in base 2? With k digits the largest number.
RSA Cryptosystem Great Theoretical Ideas In Computer Science S. Rudich V. Adamchik CS Spring 2006 Lecture 8Feb. 09, 2006Carnegie Mellon University.
Breaking Cryptosystems Joshua Langford University of Texas at Tyler Fall 2007 Advisor: Dr. Ramona Ranalli Alger.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
CDA 3100 Fall Special Thanks Thanks to Dr. Xiuwen Liu for letting me use his class slides and other materials as a base for this course.
Encryption with Keys and Passwords
AP CSP: Cleaning Data & Creating Summary Tables
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Weebly Elements, Continued
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Welcome
Information and Network Security
The False Positive Paradox
Marcial Quinones-Cardona
The W3C More on images Entity codes Remote vs Local Computers
Presentation transcript:

Dr. Gerald Kruse, Ph.D. John ‘54 and Irene ‘58 Dale Professor of MA, CS, and IT Assistant Provost Juniata College

First, a little about Juniata

William Phillips, Class of 1971!

The “Hemi” Engine ‘57 Chrysler pictured below

Designer Thomas Hoover, ‘53

$1,000,000 to the first algorithm that was 10% better than Netflix’s original algorithm What movie should we pick? $1,000,000 to the first algorithm that was 10% better than Netflix’s original algorithm

The first 8% improvement was easy…

“Just A Guy In A Garage” Psychiatrist father and “hacker” daughter team

The first 8% improvement was easy… Team from Bell Labs ended up winning

Here’s an interesting billboard, from a few years ago in Silicon Valley

First 70 digits of e

What happened for those who found the answer? The answer is Those who typed in the URL, ended up getting another puzzle. Solving that lead them to a page with a job application for… Google!

Juniata’s 2015 Summer Read – Little Brother Author Cory Doctorow’s books can be downloaded for free at his website: Cory Doctorow is an activist on the issues of intellectual access and intellectual property. Little Brother “takes place in the future (near future) and explores what types of compromises our society and government are willing to make in the aftermath of a terrorist attack.” (from the announcing Juniata’s summer read)

Juniata’s 2015 Summer Read – Little Brother Protagonist is Marcus, high school hacker, nickname: w1n5t0n (“winston” in leet). Likes to confound his school’s surveillance technology. Marcus is in the wrong place, at the wrong time, and gets detained by Homeland Security. Marcus is warned that he will be “under surveillance” when released after several days Marcus revolts by setting up technological attacks on the DHS in order “to [thwart] further efforts to restrict personal liberty.”

Surveillance Techniques in Little Brother 1) Gait recognition - “not mature yet” 2) Cracking the “SchoolBook” laptops - Yes. - via a Rootkit, a collection of computer software, which enables access by an unauthorized user, to restricted areas of its software that would not otherwise be allowed, while at the same time masking its existence or the existence of other software. $sys$ filename - mobile devices in K-12 used to change TV channels… The presence of these two elements helped set the context, this “near future” surveillance state…

Surveillance Techniques in Little Brother 3) Paranoid Linux / Paranoid XBOX - not mature as characterized in the book - questionable plot twist: who has an unopened Xbox laying around in their closet? 4) RFID tags, aka “arphid” - Nuking: - Reprogramming RFID? It depends… not for low frequency, probably for high frequency

Surveillance Techniques in Little Brother 5) IMParanoid and TOR – The Onion Router - YES! - a network of volunteer-operated servers that are connected through a series of virtual tunnels rather than making a direct connection (web- surfing, , instant messaging)

Steganography – Hiding in Plain Sight 1) Whisper a message… 2) Did you want to get in on the “secret message?” 3) If no one knows that you are sending a message, then they are less likely to pay attention to your communications. 4) A technique Julius Caesar used to send messages.

Steganography – Hiding in Plain Sight

Consider this representation of an image

Steganography – Hiding in Plain Sight Consider this representation of an image Each “column” is one pixel

Steganography – Hiding in Plain Sight Consider this representation of an image Each “column” is one pixel If each color is 8 bits, then there would be 8 “layers”

If you remove the least significant “layer” of each pixel, and replace it with a message, the image doesn’t change much Original image Image with embedded text

faculty.juniata.edu/kruse

Source code for faculty.juniata.edu/kruse <img src="junback2.jpg" border="0" height="55" width="151"> These Are A Few of My Favorite Links If I have agreed to write you a letter of recommendation: Instructions for Recommendations Helpful advice on summer research and graduate school in Computer Science: Computing Community Consortium

Histograms 1) Those “columns” in the image are just numbers, right? 2) in binary is 1*2 7 +1*2 4 +1*2 3 +1*2 0 = = 153 3) Create a histogram (bar chart created from a single column of quantitative values) of all these pixel values

Histograms If you have many black and white photographs with histograms like this

Histograms If you have many black and white photographs with histograms like this But you encounter a histogram like this, an outlier, then you would probably investigate

Histograms – hunting for outliers 1) In normal web-traffic, a small percentage is encrypted. 2) Marcus communicated with his friends using the operating system “ParanoidLinux.” 3) Their web-traffic had a much higher percentage of encryption. 4) A histogram characterizing the form of their traffic would be an outlier, prompting further surveillance, even if the traffic could not be decrypted. 5) In the book, Marcus also points out that histograms from tracking movements with RFID chips could identify abnormal life patterns, and many innocent people with secrets were harassed.

The False Positive Paradox 1) Do you react when you hear a car alarm? 2) Why not? 3) Approximately 250,000,000 motor vehicles are registered in the U.S. 4) Approximately 700,000 cars are stolen each year, which is 0.3%.

The False Positive Paradox – Page 47 Car StolenCar NOT StolenROW TOTAL COLUMN TOTAL

The False Positive Paradox – Page 47 Car StolenCar NOT StolenROW TOTAL Car Alarm Sounds (Test is Positive) Car Alarm Does NOT Sound (Test is Negative) COLUMN TOTAL

The False Positive Paradox – Page 47 Car StolenCar NOT StolenROW TOTAL Car Alarm Sounds (Test is Positive) Car Alarm Does NOT Sound (Test is Negative) COLUMN TOTAL Sensitivity refers to the True Positives, the proportion of cars being stolen that the car alarm detects accurately. Specificity refers to the True Negatives, the proportion of cars NOT being stolen whose alarms don’t sound.

The False Positive Paradox – Page 47 Car StolenCar NOT StolenROW TOTAL Car Alarm Sounds (Test is Positive) 3 ~= 99% of 3 “True Positive” Car Alarm Does NOT Sound (Test is Negative) 987 ~= 99% of 997 “True Negative” COLUMN TOTAL Sensitivity refers to the True Positives, the proportion of cars being stolen that the car alarm detects accurately. Specificity refers to the True Negatives, the proportion of cars NOT being stolen whose alarms don’t sound. For our example, let’s make the Sensitivity and Specificity both 99%.

The False Positive Paradox – Page 47 Car StolenCar NOT StolenROW TOTAL Car Alarm Sounds (Test is Positive) 3 “True Positive” 10 ~= 1% of 997 “False Positive” 13 Car Alarm Does NOT Sound (Test is Negative) 0 ~= 1% of 3 “False Negative” 987 “True Negative” 987 COLUMN TOTAL Sensitivity refers to the True Positives, the proportion of cars being stolen that the car alarm detects accurately. Specificity refers to the True Negatives, the proportion of cars NOT being stolen whose alarms don’t sound. For our example, let’s make the Sensitivity and Specificity both 99%. A False Positive occurs when a car alarm sounds but the car is not being stolen. A False Negative occurs when a car alarm does not sound, but the car is being stolen.

The False Positive Paradox – Page 47 Car StolenCar NOT StolenROW TOTAL Car Alarm Sounds (Test is Positive) 3 “True Positive” 10 “False Positive” 13 Car Alarm Does NOT Sound (Test is Negative) 0 “False Negative” 987 “True Negative” 987 COLUMN TOTAL Sensitivity refers to the True Positives, the proportion of cars being stolen that the car alarm detects accurately. Specificity refers to the True Negatives, the proportion of cars NOT being stolen whose alarms don’t sound. For our example, let’s make the Sensitivity and Specificity both 99%. A False Positive occurs when a car alarm sounds but the car is not being stolen. A False Negative occurs when a car alarm does not sound, but the car is being stolen.

The False Positive Paradox – Page 47 Car StolenCar NOT StolenROW TOTAL Car Alarm Sounds (Test is Positive) 3 “True Positive” 10 “False Positive” 13 Car Alarm Does NOT Sound (Test is Negative) 0 “False Negative” 987 “True Negative” 987 COLUMN TOTAL % (10 of 13) of the car alarms are incorrect! This is why medical screenings typically test a “B” sample with a more thorough test. And it is worse for things that rarely ocurr.

Public Key Cryptography

Cryptography “here's the Cliff's Notes version: Some kinds of mathematical functions are really easy to do in one direction and really hard to do in the other direction. It's easy to multiply two big prime numbers together and make a giant number. It's really, really hard to take any given giant number and figure out which primes multiply together to give you that number.” Page 36, Little Brother

Public Key Cryptography Pick 2 large primes, p and q, such that p != q Compute n = p * q Select a small odd integer, e that is relatively prime* to (p-1)*(q-1) Compute d as the multiplicative inverse of e * * Publish P = ( e, n ) as the Public Key Keep S = ( d, n ) as the Secret Key P( M ) = M^e mod nandS( C ) = C^d mod n *gcd( (p-1)*(q-1), e ) = 1 * *modulo (p-1)*(q-1)

Public Key Cryptography p = 5 p = 11 Compute n = p * q = 5 * 11 = 55 e =7 is relatively prime to 40 =(5-1)*(11-1) d =23 is the multiplicative inverse of e 23*7 = 161, 161 mod 40 = 1 Publish P = ( 7, 55 ) as the Public Key Keep S = ( 23, 55 ) as the Secret Key Simulation convert the word “CAT”  3, 1, 20  3^7 mod 55, 1^7 mod 55, 20^7 mod 55  42, 1, 15

Some other elements we didn’t address 1) Bayesian Spam Filters – also use histograms of word counts in 2) Social Engineering 3) Botnets – denial of service attack

Questions?

Attempts to Manipulate Search Results Via a “Google Bomb”

Liberals vs. Conservatives! In 2007, Google addressed Google Bombs, too many people thought the results were intentional and not merely a function of the structure of the web

Juniata’s own “Google Bomb”

CS 315 is my “Analysis and Algorithms” course

The False Positive Paradox – Page 47 Car StolenCar NOT StolenROW TOTAL Car Alarm Sounds (Test is Positive) 3 ~= 99% of 3 “True Positive” 10 ~= 1% of 997 “False Positive” 13 Car Alarm Does NOT Sound (Test is Negative) 0 ~= 1% of 3 “False Negative” 987 ~= 99% of 997 “True Negative” 987 COLUMN TOTAL Sensitivity refers to the True Positives, the proportion of cars being stolen that the car alarm detects accurately. Specificity refers to the True Negatives, the proportion of cars NOT being stolen whose alarms don’t sound. For our example, let’s make the Sensitivity and Specificity both 99%. A False Positive occurs when a car alarm sounds but the car is not being stolen. A False Negative occurs when a car alarm does not sound, but the car is being stolen.