Professional Documents
Culture Documents
Internship Week 3
Internship Week 3
BY ROWAN BRIGGS
CYBERSECURITY AND ITS TEN DOMAINS
• Week 2 Recap
• Passwords are susceptible
• It is important to use different tricks to try to safeguard your passwords
• Large variety of attacks on users
CYBERSECURITY AND ITS TEN DOMAINS
• Recap of Week 2
• Bitcoin is a peer to peer network
• Bitcoin uses “mining”
• Bitcoin has built in methods to incentivize good nodes
• Bitcoin is decentralized
• Bitcoin is a distributed consensus
BITCOIN AND CRYPTOCURRENCY TECHNOLOGIES
• Week 2 Recap
• Bitcoin uses block rewards and transaction fees
• Bitcoin has a set amount of bitcoin, 21 million
• The reward for creating a block is set, and halves every 4 years
BITCOIN AND CRYPTOCURRENCY TECHNOLOGIES
• Account-based ledger
• Maps transactions in chronological order
• Maps each transactions based on accounts
• Issues because it must view all transactions in order to verify current transaction
BITCOIN AND CRYPTOCURRENCY TECHNOLOGIES
• Transaction-Based ledger
• Constantly updates accounts based on transactions
• References past transactions that are relevant to the current one
• Gives more possibilities
• Merge transactions
• Joint payments
BITCOIN AND CRYPTOCURRENCY TECHNOLOGIES
• Sig Verify
• Multisig verification
BITCOIN AND CRYPTOCURRENCY TECHNOLOGIES
• OP_CHECKmultisig
• For joint sigs
• Specify public keys
• Specify t (tag)
• Verification requires tags
• Known bug pops up
• Bug accidentally removes an extra value, so must add a dummy value
BITCOIN AND CRYPTOCURRENCY TECHNOLOGIES
• Escrow Transactions
• Uses a “judge” to decide any issues
• Example of Alice, Bob, and Judy
• Multisig
BITCOIN AND CRYPTOCURRENCY TECHNOLOGIES
• Green addresses
• Uses a “bank”
• Relies on users trusting the bank, as no bitcoin code enforces banks to be good
• Example of Bob, Alice, and Bank
BITCOIN AND CRYPTOCURRENCY TECHNOLOGIES
• Micro-payments
• User begins by paying the max amount into a location
• Location pays other user every once in awhile
• Both Alice and Bob verify it when the payment is good
• Does use double spending
• Lock_time that says when transaction can be published
BITCOIN AND CRYPTOCURRENCY TECHNOLOGIES
• Week 2 Recap:
• We can make PRF and PRP
• PRP is a PRF
• PRF needs to be secure
• Took a look at block ciphers
• Took a look at CTR and CBC, but neither ensure data integrity
CRYPTOGRAPHY I
• Week 2 Recap
• Exhaustive Search for block cipher-key
• Given a few input/output pairs, you can find key k
• Side Channel Attacks
• Measure time to do encryption/decryption and power needed
• Fault Attacks
• Look for errors in last round that expose the secret key
CRYPTOGRAPHY I
• Week 2 Recap
• Linear and Differential attacks
• Given many input/output pairs, you can recover the key
• Quantum attacks
• Requires a quantum computer
• Find XeX such that f(x) = 1
CRYPTOGRAPHY I
• MAC
• I = (S,V) defined over (K, M, T)
• New variable, T = tag
• Tags must be secure and unique to each message
CRYPTOGRAPHY I
• Timing attacks
• Query server w/random tag
• Loop over all possible first bytes and query server
• Do this until verification takes a little longer than in step 1
• Repeat for all tag bytes until valid tag found
• Can use code to make computing time always take the same time
CYBERSECURITY
• Recap
• Need to be very careful with how you handle data
• Integrity is very important
CRYPTOCURRENCY
• MAC
• Importance of tags in integrity
• Very important to have consistency, to make it difficult for attackers