Moed A | |
Moed A grades are published as well as the final grades (4 points were added to the final grade). A copy of your exam can be taken from the secretariat. The deadline for appeals is 9/3/06. Appeals should be submitted only on an appeal form (which can be taken in the secretariat) to Eli's mailbox on the 5th floor. Enclose a copy of your exam. Moed b will probably be given as a combined oral and written exam. If you want to take moed b, please let me know (by an email) as soon as possible and before March 15th. Good luck in the upcoming semester, Benny. |
פורסם ב-23/2/2006, 15:38:38 Created on 23/2/2006, 15:38:38 Создано23/2/2006, 15:38:38 تم النشر ب-23/2/2006, 15:38:38 |
The grades of Ex4 and Ex5 are published | |
Note that ex4's grade is out of 150 (since it has weight of 1.5 assignment). |
עדכון אחרון ב-12/2/2006, 11:33:58 Last updated on 12/2/2006, 11:33:58 Последняя модификация12/2/2006, 11:33:58 تمت الحتلنة الأخيرة ب-12/2/2006, 11:33:58 |
project in computer security | |
In the spring semester, it will be possible to register to a project in computer security (and hacking). The topics are related to attacks on the network protocols of widely used databases, and other related attacks on databases. More details appear near room 612, and will appear later in the usual places (boards, etc). |
פורסם ב-9/2/2006, 15:00:17 Created on 9/2/2006, 15:00:17 Создано9/2/2006, 15:00:17 تم النشر ب-9/2/2006, 15:00:17 |
Moed A | |
Moed A will take place on Friday 17.2.06 09:00-12:00, at Taub 5. You are allowed to bring any non-electronic material. Reception hours before the exam: Eli: Monday 13.2, 9:30-10:30. Benny: Thursday 16.2, 14:30-15:30. Good Luck! |
פורסם ב-9/2/2006, 12:02:43 Created on 9/2/2006, 12:02:43 Создано9/2/2006, 12:02:43 تم النشر ب-9/2/2006, 12:02:43 |
Announcements | |
1. As mentioned in the last lecture, there will be no lecture tomorrow (6/2/6). 2. For those of you who are interested, on Tuesday (7/2/6) there will be a special lecture in computer security (Taub 2, 10:30) with an external lecturer who will show examples of attacks, including (but not limited to) phishing and attacks on data bases. Very recommended. |
פורסם ב-5/2/2006, 15:53:17 Created on 5/2/2006, 15:53:17 Создано5/2/2006, 15:53:17 تم النشر ب-5/2/2006, 15:53:17 |
Ex6 - a clarification | |
Q2 refers to the characteristic given in Q1. |
פורסם ב-1/2/2006, 15:05:10 Created on 1/2/2006, 15:05:10 Создано1/2/2006, 15:05:10 تم النشر ب-1/2/2006, 15:05:10 |
A small correction to ex 5 | |
The claim in Q4b is wrong for a general secret sharing scheme. Hence, (in this sub-question only), you can assume that the parties use Shamir’s secret sharing. In fact, the claim holds for any ideal secret sharing scheme. (A secret sharing scheme is called ideal if the shares are taken from the same domain as the secrets.) We will give a 5 point bonus for proving that the claim holds in this case as well. Have a nice weekend, Benny. |
פורסם ב-26/1/2006, 18:38:26 Created on 26/1/2006, 18:38:26 Создано26/1/2006, 18:38:26 تم النشر ب-26/1/2006, 18:38:26 |
Exercises 5 and 6 are published |
פורסם ב-17/1/2006, 12:12:43 Created on 17/1/2006, 12:12:43 Создано17/1/2006, 12:12:43 تم النشر ب-17/1/2006, 12:12:43 |
Correction: Adi Shamir's lecture is on Wednesday |
פורסם ב-16/1/2006, 16:27:51 Created on 16/1/2006, 16:27:51 Создано16/1/2006, 16:27:51 تم النشر ب-16/1/2006, 16:27:51 |
A few announcements | |
1. As I said in class, the upcoming tutorial (Thursday 19/1) is canceled. 2. The material of the prev. tutorial (primality testing and squaring mod prime) can be found here: http://www.wisdom.weizmann.ac.il/~oded/PS/RND/l11.ps 3. You are most welcomed to attend Adi Shamir's lecture on Thursday (14:30 Taub 337-8). Best, Benny. |
פורסם ב-16/1/2006, 13:45:07 Created on 16/1/2006, 13:45:07 Создано16/1/2006, 13:45:07 تم النشر ب-16/1/2006, 13:45:07 |
A recommended cryptography talk by Adi Shamir | |
Time+Place : Wednesday 18/01/2006 14:30 room 337-8 Taub Bld. Speaker : Adi Shamir Affiliation: Computer Science Dept, The Weizmann Institute Host : Eli Biham Title : Practical software attacks on AES-like cryptosystems Abstract : In this talk I will present a new type of software-based side channel attack, which can be applied to many types of cryptosystems implemented on modern microprocessors. The attack is highly practical, and can be mounted whenever the attacker can run his own program (even as Java code in a protected sandbox) in parallel with the encryption process. In particular, we demonstrated the extraction of the full 128-bit AES key of the standard Linux disk encryption process in 65 milliseconds by calling it with a totally unprivileged program about 800 times. The talk will be completely self contained. Joint work with Eran Tromer and Dag Arne Osvik. |
עדכון אחרון ב-10/1/2006, 14:48:48 Last updated on 10/1/2006, 14:48:48 Последняя модификация10/1/2006, 14:48:48 تمت الحتلنة الأخيرة ب-10/1/2006, 14:48:48 |
Canceled tutorial | |
Hi all, I am sorry that I've missed today's tutorial. We will set a time for a supplementary tutorial during the next tutorial. Once again--my apologies, Benny. |
פורסם ב-29/12/2005, 15:30:31 Created on 29/12/2005, 15:30:31 Создано29/12/2005, 15:30:31 تم النشر ب-29/12/2005, 15:30:31 |
Ex4 is published |
פורסם ב-18/12/2005, 15:47:48 Created on 18/12/2005, 15:47:48 Создано18/12/2005, 15:47:48 تم النشر ب-18/12/2005, 15:47:48 |
Next Tutorial (8/12) is canceled. |
פורסם ב-1/12/2005, 17:47:37 Created on 1/12/2005, 17:47:37 Создано1/12/2005, 17:47:37 تم النشر ب-1/12/2005, 17:47:37 |
Ex3 is published |
פורסם ב-1/12/2005, 15:38:37 Created on 1/12/2005, 15:38:37 Создано1/12/2005, 15:38:37 تم النشر ب-1/12/2005, 15:38:37 |
Ex2 is published |
פורסם ב-14/11/2005, 16:32:35 Created on 14/11/2005, 16:32:35 Создано14/11/2005, 16:32:35 تم النشر ب-14/11/2005, 16:32:35 |
Next Tutorial | |
This week we will have a two-hour tutorial. It'll be held at 14:30-16:30 Thursday 17/11, at Taub 9. |
פורסם ב-14/11/2005, 14:58:38 Created on 14/11/2005, 14:58:38 Создано14/11/2005, 14:58:38 تم النشر ب-14/11/2005, 14:58:38 |
Ex1 has been updated. | |
(Due to a typo in Q2). |
פורסם ב-3/11/2005, 16:00:44 Created on 3/11/2005, 16:00:44 Создано3/11/2005, 16:00:44 تم النشر ب-3/11/2005, 16:00:44 |
Today's tutorial is moved to Taub 9. |
פורסם ב-3/11/2005, 12:44:15 Created on 3/11/2005, 12:44:15 Создано3/11/2005, 12:44:15 تم النشر ب-3/11/2005, 12:44:15 |
Ex1 is published | |
Find it under the Assignments tab. |
פורסם ב-3/11/2005, 12:37:13 Created on 3/11/2005, 12:37:13 Создано3/11/2005, 12:37:13 تم النشر ب-3/11/2005, 12:37:13 |
Welome to Modern Cryptology (236506) | |
This is the first official mail from the "Modern Cryptology" course staff. Each student registered to the course, should get this mail. If somebody doesn't get it, then he is most probably not registered. So if you know about some of your friends registered to the course, which didn't get this mail, please inform them to register through the "Auto Update" feature appearing at the homepage. All information you need, appears at http://webcourse.cs.technion.ac.il/236506. The lectures' slides and recitations' slides can be downloaded and printed from the site. We might change the slides a little bit before and after the lecture/tutorial. Be ware of changes. Note that all announcements, notifications, changes and etc. will be published on the web and through this mailing list. It's your responsibility to be updated and to check from time to time for new information posted on the web. We wish luck to all of you in the upcoming semester. |
עדכון אחרון ב-31/10/2005, 11:53:15 Last updated on 31/10/2005, 11:53:15 Последняя модификация31/10/2005, 11:53:15 تمت الحتلنة الأخيرة ب-31/10/2005, 11:53:15 |