; Hand this in to: tdumitra@umiacs.umd.edu ; Required Readings @inproceedings{ Why_Crypto_Fails, Abstract = {Designers of cryptographic systems are at a disadvantage to most other engineers, in that information on how their systems fail is hard to get: their major users have traditionally been government agencies, which are very secretive about their mistakes.In this article, we present the results of a survey of the failure modes of retail banking systems, which constitute the next largest application of cryptology. It turns out that the threat model commonly used by cryptosystem designers was wrong: most frauds were not caused by cryptanalysis or other technical attacks, but by implementation errors and management failures. This suggests that a paradigm shift is overdue in computer security; we look at some of the alternatives, and see some signs that this shift may be getting under way.}, Author = {Ross J. Anderson}, Bibsource = {DBLP, http://dblp.uni-trier.de}, Booktitle = {ACM Conference on Computer and Communications Security}, Crossref = {DBLP:conf/ccs/1993}, Pages = {215-227}, Title = {Why Cryptosystems Fail}, Year = {1993}, studentfirstname ="", studentlastname ="", summary = "", contribution1 ="", contribution2 ="", contribution3 ="", contribution4 ="", contribution5 ="", weakness1 = "", weakness2 = "", weakness3 = "", weakness4 = "", weakness5 = "", interesting = "high/med/low", opinions = "", } ; BibTex cross-references (don't add anything here) @proceedings{DBLP:conf/ccs/1993, Bibsource = {DBLP, http://dblp.uni-trier.de}, Booktitle = {ACM Conference on Computer and Communications Security}, Editor = {Dorothy E. Denning and Raymond Pyle and Ravi Ganesan and Ravi S. Sandhu and Victoria Ashby}, Isbn = {0-89791-629-8}, Publisher = {ACM}, Title = {CCS '93, Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993}, Year = {1993}, }