This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Massachusetts Institute of Technology Handout 5 6.857: Network and Computer Security September 11, 2003 Professor Ronald L. Rivest Problem Set 1 This problem set is due on paper, on Thursday, September 18 at the beginning of class. You are to work on this problem set in groups of three or four people. Problems turned in by individuals, pairs, pentuples, etc. will not be accepted. Be sure that all group members can explain the solutions. See Handout 1 ( Course Information ) for our policy on collaboration. If you do not have a group, seek partners by emailing TA . Homework must be typed! Each problem answer must appear on separate sheets of paper. Mark the top of each sheet with your name(s), the course number (6.857), the problem set number and question, and the date. Homework must be typed and clear. We have provided templates for L A T E X and Microsoft Word on the course website. Grading and Late Policy: Each problem is worth 10 points. Late homework will not be accepted without prior approval. Homework should not be submitted by email except with prior approval. ( Somebody from your group should be in class on the day that the homework is due.) With the authors’ permission, we will distribute our favorite solution to each problem as the “oﬃcial” solution – this is your chance to become famous! If you do not wish for your homework to be used as an oﬃcial solution, or if you wish that it only be used anonymously, please note this on your homework. Problem 1-1. PGP This problem has both individual and group elements to it. Your group should turn in one write-up answering each of the parts labelled [Group] , but all key pairs, emails, etc. should be created and sent individually. Read Alma Whitten’s paper, “Why Johnny Can’t Encrypt.” (There is a link to it on the “Lectures and Handouts” page of the course website.) Locate and install a fresh version of PGP or GPG. There are versions for Unix ﬂavors, Windows, and the Macintosh. See http://web.mit.edu/network/pgp.html for downloads. If for some reason you are not able to download from this site, http://www.pgpi.org/ may be of use....
View Full Document
- Spring '03
- Computer Security, ITunes, security policy, Public-key cryptography, Pretty Good Privacy, PGP key servers