From miodrag@CS.UCLA.EDU Wed Nov 19 22:26:45 2003 Date: Wed, 19 Nov 2003 22:26:15 -0800 (PST) From: Miodrag Potkonjak To: jwong@CS.UCLA.EDU 1. Explain secret and public key cryptography schemes. Use small examples to illustrate your claims. State relative advantages of each scheme. 2. Explain the Diffie-Helman key distribution scheme. Show a small example. Explain (very briefly) other public key schemes and their relative advantages and limitations. 3. Explain the Shamir's secret sharing scheme. Explain its application. Show a small example. Explain potential alternatives. 4. What is perfect secret sharing scheme. Show at least one perfect and three non-perfect schemes. 5. Explain zero knowledge proof. Demonstrate how zero can be applied to graph coloring and Hamiltonian cycle problems. 6. Explain time-stamping protocol. 7. Explain how poker can be played over phone. Explain the scheme using both physical analogy mechanisms as well as by using cryptographical protocols. 8. Explain at least four methods for watermarking text. Discuss advantages and limitation. Explain possible attacks. 9. Explain at least four methods for watermarking audio. Discuss advantages and limitation. Explain possible attacks. 10. Explain at least four methods for watermarking image. Discuss advantages and limitation. Explain possible attacks. 11. Explain at least four methods for watermarking video. Discuss advantages and limitation. Explain possible attacks. 12. Explain active watermarking schemes for audio, image and video. 13. Explain four schemes for watermarking graph coloring solutions. 14. Explain three schemes for watermarking SAT solutions. 15. Explain differences between horizontal and vertical active objects watermarking schemes. Show examples for both schemes. 16. Palsberg's question 17. Agrawal's questions 18. Explain at least two schemes for watermarking in biological computations. 19. Explain fairness and credibility issues in watermarking. 20. Explain computational forensic engineering techniques. Discuss, in technical detail their application to intellectual property protection. Show at least one example. 21. Explain differences between localized and distributed watermarking. 22. Propose and explain one hardware and one software metering scheme. 23. Explain key issues in reverse engineering. 24. Explain Trojan horse and virus attack, modeling, and defense techniques. 25. Explain sandboxing, secure co-processors, and firewall-based secure mobile code techniques.