CMU 15-827, Homework 2

Out: 17 November 1997

Due: 12 December 1997


Ground rules: You are strongly encouraged to work in groups on this
homework.  I recommend groups of 3-4 people.  If you want to work on
this by yourself, let us know.  Each group should only turn in one
copy of the homework.

You are encouraged to use any sources whatsoever in completing this
homework.  However, please be careful to document any sources that you
use (excluding class lectures, help from the instructors, and material
from the textbook.)

If you have questions about the assignment, please ask Doug Tygar!

(1) Look at several Visa and Mastercard numbers and infer a simple
    algorithm for checking whether a credit card number could be valid.

(2) In electronic commerce, one might want to make a purchase
    anonymously.  One may also wish to complain if one receives poor
    service.  Can you think of some ways to reconcile these properties?
    What additional information is needed from the purchase protocol to
    accomplish this?

(3)  (a)  Here's a simple way to vote -- choose your favorite anonymous
	  electronic cash protocol.  Issue tokens to each voter
	  according to the number of votes they have.  The voters then
	  transfer these tokens to other parties to vote.  Fill out
	  this sketch.  Discuss what works and what doesn't work.  Are
	  there any additional properties not usually in electronic
	  cash protocols that would make them useful for this type of
	  conversion to electronic voting?

     (b)  Can you convert an electronic voting protocol into an
          electronic cash protocol?  Describe how -- or if you can not
          find a way to do it, discuss the difficulties.

     (c)  What about converting between auctions and elections?

(4)  You want to synchronize computers to the real time.  One solution
     is to buy a WWV receiver, or a GPS receiver.  What are the
     security threats with this approach?  (The relevant information
     about WWV and GPS receivers is simply the existence of a time
     signal.)

     Discuss a secure way to synchronize real time at minimum cost and
     minimum human intervention.

(5)  Describe the properties that would be desirable in a secure
     protocol for implementing anonymous auction markets (along the
     lines of NASDAQ or an on-line stock market).

(6)  Pick at least three suggestions given by Needham and Abadi
     in their guidelines for cryptographic protocols.  For each
     suggestions, give an example where their ideas apply and result
     in an improved protocol, and also an example where their ideas
     lead to a poorer protocol.  Extra credit for highly original
     examples.

(7)  Suppose that I want to leak information out of a secure facility
     (for example, the secret plans for Intel's new processor).  Pick
     one of the authentication protocols we've described in class, and
     describe how I can leak information (deliberately) by using the
     authentication protocol.

     Can you describe an authentication protocol that is leak-proof?
     If so, give it; if not, justify why not -- and discuss how you
     can minimize the number of bits leaked.

(8)  Give a "black box" description (not tied to any specific
     cryptographic representation) of Chaum's electronic token
     blinding operation.  Use it to give a black box description of
     Chaum's digital cash protocol

Ari Rapkin