Prompt for "Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks"

Due on Wednesday, November 17 by 11:59pm

Write a technical paper review, and in your discussion, please address the following question.

  1. At the end of the paper, Blaze states that an important property maintained by a good cryptosystem is that it prevents an attacker from testing the value of any single bit of a key independently. What is the relation between that property and the attack described here? Take a few minutes and see if you can think of (or find on the Internet) an example of such an attack against a software cryptosystem. Describe that attack.

Turn-in instructions: commit your response to your reading responses Github repository. Please use the LaTeX template supplied in your repository. Be sure to turn in both your source .tex file and a compiled .pdf file.

You can generate a PDF from the template with the command:
$ pdflatex reading08.tex
Please be sure to name your generated PDF reading08.pdf. You will need to install TeXLive on your personal computer to build LaTeX documents: macOS, Windows, Linux. CS Lab machines already have TeXLive installed.
  • CSCI 331: Introduction to Computer Security, Fall 2021

CS 331 course website

Powered by Bootstrap 4 Github Pages