network and computer security, lecture 10 - mit · pdf file6.857 computer and network security...

12
6.857 Computer and Network Security Lecture 10 Admin: Problem Set #2 due Problem Set #3 out Project Ideas: Where did Mt. Gox bitcoins go? Attack reduced round “Simon” or “Speck” with SAT solver? Today: Message Authentication Codes o HMAC o CBC-MAC o PRF-MAC o One-time MAC Combined mode o AEAD (Authenticated encryption with associated data) o EAX mode (ref. pages 1-10 of paper only) Finite fields and number theory 1

Upload: vudung

Post on 18-Mar-2018

229 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Network and Computer Security, Lecture 10 - MIT · PDF file6.857 Computer and Network Security Lecture 10 Admin: Problem Set #2 due Problem Set #3 out Project Ideas: Where did Mt

6.857 Computer and Network Security Lecture 10

Admin:

Problem Set #2 due Problem Set #3 out

Project Ideas:

Where did Mt. Gox bitcoins go? Attack reduced round “Simon” or “Speck” with SAT solver?

Today:

Message Authentication Codes o HMAC o CBC-MAC o PRF-MAC o One-time MAC

Combined mode o AEAD (Authenticated encryption with associated data) o EAX mode (ref. pages 1-10 of paper only)

Finite fields and number theory

1

Page 2: Network and Computer Security, Lecture 10 - MIT · PDF file6.857 Computer and Network Security Lecture 10 Admin: Problem Set #2 due Problem Set #3 out Project Ideas: Where did Mt

cv

_L

L4-t

I4

fl

iUj

t)

Ic

os

rsti

CI

—j

S.

‘I

I

LL

LZ

I

S4

h*.t

4r#4-)

-

II

—I

-.

--

I-In

4.L

_1

dI

S11t H

z:0-U4j

--

PC

—it

—ici

is

-J

a’

I

‘I

I4

mS

--

1

-

-t-

z-_

3S

.

S-

s__

x

I

ae

4—

r-

0

I

‘&a

Ii

4J

4—

lb

V

&7

zttz.C

lX

z1

.-.1

HRr(5

IQ

J

a

LU

I T

i::z::z:ivzE

I

LsL

itL

flIC

->.

;SI

--t

j ---i-t-t--jt-

it

ii-—

-,

-

-3-—

1-.4

4-

a..S

ic

I

I

Ia

S

—‘

L?

1

____

_i4

-—

S-

——

li:;:r

C

22

.

-

---

—-

——

-U—

t-4

--——

—’

.3

—--1-t

—--1

-t--——

3_L

__

Ita

tI

a4C-

a.

a.1-Ja!

.

2

Page 3: Network and Computer Security, Lecture 10 - MIT · PDF file6.857 Computer and Network Security Lecture 10 Admin: Problem Set #2 due Problem Set #3 out Project Ideas: Where did Mt

rr

___j

LIL3 11

O

f: ‘frAc(4)

-,-------

L — —

Etj-

;TQPC

r -r

zr——.n.:::z:

-. —

-w

keEra. nqmre

p4;

cr

flzz:z9

-

1 i’s. a - I ‘C

i4Lfl

S1c

Q CcfllVb

1

L1nicI

Wi

:‘

wI= KS

I ——

Hzi fv’)’) 4

HL

LSLCvIç!—=.

14 sMI Wr

I a

r •ifl ii1L 1 :

4

St 1EIELEIt2DEZEUJ

1 J— — — a — — r

C

T

I:V

Vt4

01

I

::i!wr(J:::— ‘3 fl! — — -— — —

3

Page 4: Network and Computer Security, Lecture 10 - MIT · PDF file6.857 Computer and Network Security Lecture 10 Admin: Problem Set #2 due Problem Set #3 out Project Ideas: Where did Mt

—.-

“..-

.-

6’-t

YIb

In

-

:EjE

::::

14E1T

4iL

L{4t

‘t

LJZ

i1

--

f__!_

_n___

-L--

LZ

i::rt

kzIi

zzD

1Z

ZF

itsf*r

n-S

—U

:iz:z

$:z

tLL

1:ffrtifljtt

--

--

-ta

Li“nrrr

:r

i--—

xrêZ

TiT

ri

*i714tS

*%

—---

r’I

nr.4

.nt

irp

4id

ilIc

I--

fl_

__

——

—b

aL

.aL

I_.3

#-

——

IC

IIS

_p

i..

-Id

—H

IH

9

43

I,

I

a-

p I

.-s

r’,’r

a -

! r-

-

t-—

t---

-’S

r!

$,z_ r

____

fl-I,

jj

3!

n—

:--

4*JJ

1L

41L

_.

H4

0:

S—t

iat

.IF: a a

I

4

Page 5: Network and Computer Security, Lecture 10 - MIT · PDF file6.857 Computer and Network Security Lecture 10 Admin: Problem Set #2 due Problem Set #3 out Project Ideas: Where did Mt

UNCLP

LIlS

1— —--

ZEEEE’EZ

4

tz

1k.ràjkca.,‘zz:zzi::—- — — — — — — — — I — — — — — — — —

- ---- -—

I n.h1oçil Li I

P.bc— cay

A

t4NA’ ‘/

_LPX evc

L I -

2

- .-[ L

tzzLtzL....j

__

..Lz+4_

—.

i Yniwi

-

:tz:t4

P i_I

5

Page 6: Network and Computer Security, Lecture 10 - MIT · PDF file6.857 Computer and Network Security Lecture 10 Admin: Problem Set #2 due Problem Set #3 out Project Ideas: Where did Mt

L

—*

EEEEEEEEz2: ———

::::::z::zz:±IL___________:3svd

F-”S/lift-

:JcJjfl1II:Ii

6

Page 7: Network and Computer Security, Lecture 10 - MIT · PDF file6.857 Computer and Network Security Lecture 10 Admin: Problem Set #2 due Problem Set #3 out Project Ideas: Where did Mt

—...

.—

.—.

___________________________

Sp-i r

11

.1

I, 1: .0 be

lv.

-ti

-e 3-

7,L

1L

i}J

zIE

tz’_

zzrz

Hij

iI

II

L*t.

a

I

4

1I

a-

.1-i

-____

L__

of.

— 1%

—S

ki1 i_

4

a

F—

IC

T

-1.-

.

L

a!..

jEj

:zz

jzp’

:pagz

ztE

-t!

I:i

_1

4—

r-;

3A

ra_E

_4.

-

IE

it: *

zZLi

E IE

!bE

flE

Fz’l

:t1

sA

.3.

-._j

_.

p

C S.

S

I’..

IS.:

.1

fl-i

ni. :1

-C

73

A1; H

41

Li.Li

V

+ ft

S

-1

UI

:Ei

ZE. E

L]:r

El

-4-

UH 0

!$-

4n

-—ç4L

nj

Ht

---1

I

e t

k R.

I.

J}_

÷h-

4-+

-—-

____

l4’

IL

—1--c9$w

7ArI

Ii

It

I

a S.

-..t

. - -

.3

C.

4:

4L

-r

L

p

i:I

--

L-_

_

‘T

i;

4 I

I

r

1•

II

——

-_J

iJL

LL

,

7

Page 8: Network and Computer Security, Lecture 10 - MIT · PDF file6.857 Computer and Network Security Lecture 10 Admin: Problem Set #2 due Problem Set #3 out Project Ideas: Where did Mt

________

II H1,

[ —

____L

. ___tJ

r, t 4±r r4- 4---t-—r’

4. -4—H t’tht’-)—H-—•---÷-- .. —.—‘-. I -k ;-__ $

_4_ L. __ - r

r t H- --

rr -—

—-

.__._--_L_ j—---+ -I ç ..—

— --1— ——&

S.

— - — -— - - - .- __-•.__— -. - ...—. — .____t_ - - —..- -. —

(VPIC —

---—--—— —1 *:;:y( ----------

___

a-- -—--- -

1 1 *tt--1—ffffi____t_. -_----‘—_-5-_

-,

—-4-—,

8

Page 9: Network and Computer Security, Lecture 10 - MIT · PDF file6.857 Computer and Network Security Lecture 10 Admin: Problem Set #2 due Problem Set #3 out Project Ideas: Where did Mt

1W, I

- -- -

--

:{Jj -t•*tioiin’is: &

tat4froñJ IGF .1 hI

I t I flalosdlJ’)

1w 1W vet-l

:rzzz:z: zzL:::z’:J:’:L:‘— -H%Fth — LL_t - -

— 1____

—i--- — H±— rHHH:*1zz(AT5iz__ 4C1Z:T4Z 4zz

tzitz i:p-qfj$‘P

FHEHEt— — I

ir1tt$!* i1 i -

‘%i$’

zL1: i4iu sJ4t iritit I 1

——1— — iIJ I IIij_ I———n———— m’—— —j—

-----

1z±z:t:1: zI::: :::I H--’ LL - -

H—H-1—z:z1: :1: :t:lt ElI i tn tri::

9

Page 10: Network and Computer Security, Lecture 10 - MIT · PDF file6.857 Computer and Network Security Lecture 10 Admin: Problem Set #2 due Problem Set #3 out Project Ideas: Where did Mt

I VAIEZJPAGE

a a’

4%4 k !J!fOEE;EEjE EL LZ4Er:z ::E1::Ez REEE

4’cI

±or

zz:1:iia1%!

rL_L__-——--- ———n

— —+—v——L

— — — — — — — —

EZEJEE63ZIEE ZLkE E2EtZ— — — — — — — — — — —

jh1t t— -——h—H— — — — — — — — — — — — —— -H

———-1—--+— -‘-—-——H——

tm— —r Htr—

L

Z Al L iILEq5ft4,Ee4 tz

EEZIEEEEEEEEtE

l_-__

- - -

I —

10

Page 11: Network and Computer Security, Lecture 10 - MIT · PDF file6.857 Computer and Network Security Lecture 10 Admin: Problem Set #2 due Problem Set #3 out Project Ideas: Where did Mt

I-

—.

—,i.fl

II

21

-I ILi r,

Lv

t-,

1. -r

in lbS—

i—.b

iil

a2-

el’

t-1

’a

s

?H7

iLjZ

IZI

a—i-

2V

-I-

91

0(

Th

i%

_d

i—--f-j-1

t---:m

+t__4

±‘L

1-t_

4-E

-_

a

--

-,

•-‘

:!J

hi.

‘p

fl

‘1

.r

1%

.:i:

I

r S

I-’

1li

D

a-

P

10

•-.-

I.

.F

--

--

4’

IF’

rtrt

-—

L!

tt?ri

zLii

tci

113

-[C

--e

0

a

,. jL

Lts

jt

cL

°L

?‘_j

&H

-t-I

i-

-4-

——

EF

—C

-—

Ci

L-

i-i-

IITi

lE

__

1? a,11

[‘ft •‘j

r,9

J

11

Page 12: Network and Computer Security, Lecture 10 - MIT · PDF file6.857 Computer and Network Security Lecture 10 Admin: Problem Set #2 due Problem Set #3 out Project Ideas: Where did Mt

MIT OpenCourseWarehttp://ocw.mit.edu

6.857 Network and Computer SecuritySpring 2014

For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.