CS551: Security and Privacy on the Internet, Fall 2000
Manifest: Monday 16 October 2000
Assignments Due 18 October Midterm
(Think about this with your neighbors. Now.)
The CIA would like to send instructions to a spy stationed in Outer Mongolia. The spy is staying at a hotel with a public fax machine, but otherwise can use no powered equipment without causing suspicion.
How can the CIA send instructions to the spy with perfect secrecy?
The spy may not have any suspicious spy-like materials (e.g., a code book), but may have a box of (random-looking) printed transparencies.
- Moni Naor and Adi Shamir, Visual Cryptography, 1995.
- Charles Bennett, Quantum Cryptography: Uncertainty in the Service of Privacy, 1992.
- Los Alamos Quantum Information Page
- Neil Gershenfeld and Isaac Chuang, Quantum Computing with Molecules, Scientific American, June 1998.
- Richard Feynman, There's Plenty of Room at the Bottom, Caltech lecture from 1959.
- How does visual cryptography work?
- What is Heisenberg's Uncertainty Principle (and why is it useful for cryptography)?
- How does quantum cash work?
- How does quantum key distribution work?
- What is in the Sneaker's black box?
University of Virginia
Department of Computer Science
CS 551: Security and Privacy on the Internet