3. Suppose that Alice uses a stream cipher to encrypt plaintext P, obtaining ciphertext C, and Alice then
sends C to Bob. Suppose that Trudy happens to know the plaintext P, but Trudy does not know the key K
that was used in the stream cipher.
5. Suppose that on a particular system, all passwords are 10 characters,
there are 64 choices for each character, and the system has a password
file containing 512 hashed passwords. Furthermore, Trudy has a dictionary
of 2^20 common p
4. In the text, we argued that it's easy to delegate using capabilities.
a. It is also possible to delegate using ACLs. Explain how this would work.
yes- An ACL specifies which users or system processes are granted access to objec
Among the fundamental challenges in information security are confidentiality, integrity,
and availability, or CIA.
a. Define each of these terms: confidentiality, integrity, and availability.
Confidentiality deals with prevent
4. Consider the following mutual authentication protocol, where KAB is a shared
Give two different attacks that Trudy can use to convince Bob that she is Alice.
First obvious flaw in this mutual authentication protocol:
Assume a disk has the following characteristics [1.5 pts]:
There are 10 surfaces with 100,000 tracks each
Tracks hold an average of 1000 sectors of 1024 bytes each
20% of each track is used for gaps
The disk rotates at 10,000 rpm
The time it takes the
1. This problem deals with digital certificates (aka public key certificates).
a. What information must a digital certificate contain?
ANS: Digital certificate contains name of user and users public key.
b. What additional information can a dig
3. Suppose that a secure cryptographic hash function generates hash values
that are n bits in length. Explain how a brute force attack could
be implemented. What is the expected work factor?
Birthday problem can be applied here to reduce o
A brute force can try all th
Q1: Suppose blocks hold either three records, or ten Key-pointer
pairs. As a function of n, the number of records, how many blocks do
we need to hold a data file and:
(a) A dense index (0.5 Pt).
(b) A sparse index (0.5 Pt)?
a) For dense index we need
Version 1 (You will be notified of any changes or updates.)
VIS 142 Practices in Computing Arts
Fall 2K16, visual arts department
Professor: Brett Stalbaum
Brett's main point of contact for VIS 142 business: TritonEd mail (tritoned.ucsd.edu)
Lecture: Th 5
Project 1 Documentation
When I think of a traditional video game, what comes to mind is likely similar to that of any other
person that has played a video game. First-person shooters, platformers, MMORPGs; the kinds of games
FORREST M. MIMS III
grow, QTIOM~ ."
COPYRiGHT 1983, 2000 BY FORREST M. MIMS, III , 1 C - - a? A = w
i MW, . _ . . .
ALL RIGHTS RESERVED _ _ _ . _ KW , H a .Eewmmwimk
, i $0th NEEDLE. THE M h I
Published for Forrest M Mim
Educational Technology: A Critique
Author(s): Vera Ohanian
Source: The Elementary School Journal, Vol. 71, No. 4 (Jan., 1971), pp. 182-197
Published by: The University of Chicago Press
Stable URL: http:/www.jstor.org/stable/1000549
Accessed: 16-11-2016 18
VIS 147A. Electronic Technologies for Art I
UCSD Fall 2016
Emily Grenader, Lecturer / Office hour: Wednesday 5:00-6:00pm ([email protected])
TA: Pedro Franco Navarro / Office hour: Tuesday 2:00-3:00pm ([email protected])
Lecture: Wednesday 7-8:50pm W
FINAL PROJECT: DESIGN OF A TOY
Develop an interactive toy that is engaging for ages 8+. Consider how a set of similar/different constructional
elements can be connected to yield novel combinations. Provide a means of packing or containing the toy. Materia
Calendar is subject to change throughout the quarter.
Extra Credit Links: Article or Exhibit/Event
Week 1 Lecture: Introduction, Actuators & Transducers / Early Works in Technology and Art Part I
Due in lab: Bring an old toothbrush and any other
VIS147 FINAL PROJECT RUBRIC: DESIGN OF A TOY
Research + Concept + Documentation 50%
A strong conceptual idea. An original project or a new take on an old toy. Thoughtful consideration of how
the physical interface relates