feb07 - CS 426 class Charles Dickens 200th birthday...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
CS 426 class Feb 07, 2012 - Charles Dickens' 200th birthday www.cs.purdue.edu/homes/ssw/cs426/{index.html,syll.pdf,outline} Bulletin Satellite phone encryption has been cracked. See http://j.mp/ygBU46 for a news report. See http://gmr.crypto.rub.de/paper/paper-1.pdf http://gmr.crypto.rub.de/paper/paper-2.pdf for technical details. The satellite phone people kept its encryption algorithm secret. Since it was not public, no one examined it carefully. Two German cryptographers learned the algorithm by disassembling the firmware in a satellite phone. Once they got the algorithm, it was easy to crack it. It turned out to be weak because it is based on LFSRs. The result is that it is easy to eavesdrop on most satellite phones used in Europe, Africa and Asia. (General purpose) Operating System security User Authentication - is based on something the user . .. Knows: password, PIN number, passphrase, handshake, mother's name Has: badge, key, license, uniform, id card Is: biometrics - face, fingerprint, retina scan, voice Passwords are the most common user authentication method Password safety:
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/23/2012 for the course CS 426 taught by Professor Staff during the Spring '08 term at Purdue.

Page1 / 2

feb07 - CS 426 class Charles Dickens 200th birthday...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online