Online Bids, Spam Reduction, Secret Sharing, Visual Cryptography, Random Numbers




CS166

Chris Pollett

Oct 8, 2012

Outline

Online Bids

Spam Reduction

Spam Reduction -- A protocol

Spam Reduction -- Protocol Analysis

Quiz

  1. The oligarchy PKI trust model is what's used by most browsers.
  2. The birthday attack can be used to at most half the number of keys you need to search to find a collision.
  3. RFC 2104 computes an HMAC as `h(M,K)`.

Shamir's Secret Sharing

Secret Sharing Graph

"2 out of 3" Secret Sharing

2 Out of 3 Secret Sharing Graph

"3 out of 3" Secret Sharing

3 Out of 3 Secret Sharing Graph

Secret Sharing Example

Secret Sharing Example

Key Escrow Example

Visual Cryptography

Visual Cryptography

Pixel Sharing

Sharing a B&W Image

Pixel Sharing

Visual Crypto Example

Example of Pixel Overlay in Use

Visual Crypto

Random Numbers

Texas Hold 'em

Card Shuffle

Card Shuffle Attack

Redux

What is Random?

Software Randomness