Lecture 3 - Attack Surface Measurement | |
Hello all! A recording of lecture 3 - "Attack Surface Measurement based Risk Analysis" is now available on panoptotech. Please watch the recording prior to lecture 5 (Sunday June 23rd). You will be able to ask questions on the lecture on the beginning of lecture 5. Also, unfortunately only the first half of lecture 2 was recorded. You can watch lecture 2 from last year if you need, it is almost the same. |
פורסם ב-14/6/2024, 16:49:05 Created on 14/6/2024, 16:49:05 Создано14/6/2024, 16:49:05 تم النشر ب-14/6/2024, 16:49:05 |
Elf Tutorial | |
Dear students, Wev`e published the supplementary Elf tutorial, it might help with EX1. The link, together with the material is provided under the Tutorials page. We review the compilation, linkage and loading process, as well as the ELF format. We wish you happy holidays! |
פורסם ב-12/6/2024, 11:50:23 Created on 12/6/2024, 11:50:23 Создано12/6/2024, 11:50:23 تم النشر ب-12/6/2024, 11:50:23 |
HW1 - VM update | |
The VM was updated due to the absence of some files. Please Notice that you are working with the new one. Good Luck! |
פורסם ב-10/6/2024, 17:08:18 Created on 10/6/2024, 17:08:18 Создано10/6/2024, 17:08:18 تم النشر ب-10/6/2024, 17:08:18 |
HW1 published! | |
Dear Students, HW1 is published, it is due on 23/6. Good luck! |
פורסם ב-9/6/2024, 09:36:02 Created on 9/6/2024, 09:36:02 Создано9/6/2024, 09:36:02 تم النشر ب-9/6/2024, 09:36:02 |
The semester's schedule | |
Is published under the Syllabus tab. Note that on weeks 4 and 8 we will switch between the times of the lecture and the tutorial. On the 7th week; we will have a guest lecture, that will start at 13:30, followed by Sara's lecture. |
עדכון אחרון ב-8/6/2024, 22:43:01 Last updated on 8/6/2024, 22:43:01 Последняя модификация8/6/2024, 22:43:01 تمت الحتلنة الأخيرة ب-8/6/2024, 22:43:01 |
Clarifications following tutorial | |
A few clarifications following Sunday’s tutorial: 1. The terms encryption and signature were used interchangeably, because in some cases (Like RSA), the same algorithm can be used for both. They are not the same (And in other cases we can`t use the same algorithm, like DSA)! Encryption and digital signature are 2 different cryptographic primitives that are used in different manners for different purposes. The goal of encryption is to hide the information, while the goal of digital signature is to authenticate the signer and integrity protect the information, so that the receiver will be able to verify it. 2. Regarding keys – in an assymetric digital signature algorithms, a key pair is used. Consisting of a private signature key (known to the signer only), and a public verification key (known to all) and. Not to be confused with symmetric keys, where there’s no private or public key, there’s only one key which is called the secret key, and it is used for both signature and verification. 3. One way hash function: the main point with cryptographic hash functions I wanted to emphasize is that it is one way. I.e., given a value of the hash, an attacker will have a hard time finding a message which is being hashed to the same result. If the one-way hash function is good, then the average number of attempts required to find a message that hashes to the same value is 2^(n-1), where n is the length of the hash. 4. Collision free: a one-way hash function is collision free if it hard to find a pair of messages that hash to the same value. If a one-way hash function is collision free, then the average number of attempts required to find two message that hash to the same value is 2^(n/2) (Birthday paradox), where n is the length of the hash. 5. Why do we require “collision free”? Since it is easy to manipulate digital information without changing the semantic. If a function has a set of known “weak” hash values, and attacker can create a message that hashes to a weak value, and replace it with a colliding message. |
פורסם ב-5/6/2024, 13:32:14 Created on 5/6/2024, 13:32:14 Создано5/6/2024, 13:32:14 تم النشر ب-5/6/2024, 13:32:14 |
Welcome! | |
Welcome to Computer Security 236490 - Spring 2024. The first lecture and tutorial are scheduled for 2-6-24. The lectures and tutorials will be recorded. Zoom participation will also be possible. |
פורסם ב-20/5/2024, 18:59:46 Created on 20/5/2024, 18:59:46 Создано20/5/2024, 18:59:46 تم النشر ب-20/5/2024, 18:59:46 |