Download presentation
Presentation is loading. Please wait.
Published byBerenice Parker Modified over 9 years ago
1
Master and PhD examples Prof. Yvo Desmedt Department of Computer Science Florida State University, USA www.cs.fsu.edu/~desmedt Partially funded by NSF and DARPA by Yvo Desmedt
2
A. General interests B. Master thesis: examples: 1. Computer viruses 2. Information Hiding and Cryptography C. PhD thesis: examples: Threshold cryptography
3
A. General interests 1. Cryptography: –Classical topics: Authenticity, Integrity, Privacy –Modern topics: anonymity broadcast privacy protecting against insiders, e.g. –when a company is signing –protecting copyright law enforcement …
4
A. General interests 2. Computer Security: –Computer viruses –Information hiding –Secure distributed computation –Survivable computers
5
A. General interests 3. Network Security: –PKI –Security and Reliability in: non-point-to-point networks in unknown networks wireless
6
B. Master thesis: examples: 1. Computer viruses: platform independent computer virus: written in LaTeX/emacs: Student: K. McMillan 2. Information Hiding and Cryptography Students: S. Hou and T. V. Le Presented at: Asiacrypt 98, Information Hiding 99
7
B. Master thesis: Information Hiding Motivation: History: steganography: older than cryptography? Importance of modern steganography: –Bypass key escrow –Protect privacy –Achieve some form of anonymity –Protect freedom of expression –Facilitate spies to communicate –…
8
B. Master thesis: Information Hiding Current security of steganography –low to poor –requires complex computer programs Security goals: –Privacy: unconditional –Steganography: warden=human without computer –Key: must also be steganographic Implementation goal: –Decryption: without computer
9
B. Master thesis: Information Hiding Audio cryptography: binary case: –Sound (and also light!) is a wave. This implies that a wave can cancel another one provided these are 180 degrees out of phase. –Note: for light this has been called: Optical Cryptography: however expensive equipment is needed to realize this. –Cover: e.g., music –Demo:
10
B. Master thesis: Information Hiding Audio cryptography: non-binary case: Simulated output: this is the method to use when there is no analog mixer and amplifier: Modular Amplitude Method: share 1, share 2, simulated sum Phase Shifting Method: share 1, share 2, simulated sum Frequency Flipping Method: share 1, share 2, simulated sum
11
C. PhD thesis: examples: Threshold cryptography Students: Y. Frankel and B. King Allows, e.g. company to sign instead of a single individual. For more details: see: www.cs.fsu.edu/~desmedt Several publications
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.