"This instrument can teach, it can illuminate; yes, and even, it can inspire. But it can do so only to the extent that humans are determined to use it to those ends. Otherwise, it's nothing but wires and lights in a box. There is a great and perhaps decisive battle to be fought against ignorance, intolerance and indifference. This weapon of television could be useful."
Had he known about modern information technology, Murrow might have added surveillance to the three adversaries he named in the great battle. Certainly we practitioners must have a share in governing how technology is used in our colleges and universities. We must do the hard work of educating ourselves and our students in how to use this tool for illumination and freedom. Otherwise, as Murrow said at the beginning of that famous speech, "this just might do nobody any good."
Thanks to free software, faculty can even own the means of digital education production if they put their minds to it. While the echoes of Marx and Engels in this suggestion may make some people uncomfortable, faculty taking control of the tools we use in our digital labor is our best bet for preserving our role in academic governance and the quality of education on the emerging virtual academic shop floor. The advantages of choosing this path far outweigh any individual fears of learning how to operate new technologies or in departing from the traditional ways in which some of us have chosen to teach. The only things we have to lose are our virtual chains. At the same time, we have a whole new world to win.
This essay examines some of the assumptions and traditions behind the IT governance structure currently prevalent on so many campuses and suggest some different perspectives on these issues. These alternative ideas then suggest a new approach — similar to, and in fact supporting, the Open Access movement for scholarly products but centered on the openness of the IT infrastructures themselves of college and universities.
To clarify the foundations of this new model of shared IT governance in academia, this essay states two important new principles: the principle of academic network freedom and the principle of shared academic network governance. These principles can clarify the appropriate roles of the various actors in university governance and give guidance about how to implement new governance models.
One particular example, built out of the semigroup of doubly stochastic matrices, yields classical but probabilistic computation, helping explain why probabilistic computation can be so fast. Another example is a smaller and entirely $\RR$eal version of the quantum one which uses a (real) rotation matrix in place of the (complex, unitary) Hadamard gate to create algorithms which are exponentially faster than classical ones.
I also articulate a conjecture which would help explain the different powers of these different types of computation, and point to many new avenues of investigation permitted by this model.
We characterize $\boldsymbol{\Gamma}_n$ and determine its geometry, topology, and combinatorial structure. For example, we find that $(A,P)\in\boldsymbol{\Gamma}_n$ if and only if $A^tAP=P$. We show that for any $n$, $\boldsymbol{\Gamma}_n$ is a connected set, and is in fact piecewise-linearly contractible in $\mathbf{B}_n\times\boldsymbol{\Sigma}_n$. We exhibit two finite decompositions of $\boldsymbol{\Gamma}_n$. We derive the geometry of the fibers $(A,\cdot)$ and $(\cdot,P)$ of $\boldsymbol{\Gamma}_n$. $\boldsymbol{\Gamma}_3$ is worked out in detail. Our analysis exploits the convexity of $x\log x$ and the structure of an efficiently computable bipartite graph that we associate to each ds-matrix. This graph also lets us represent such a matrix in a permutation-equivalent, block diagonal form where each block is doubly stochastic and fully indecomposable.
We argue that there is a fundamental gap between the stated goals of the TCG's IBC and the central technology that is intended to achieve these goals, which gap is simply that remote attestation asks the attesting platform to answer the wrong question — the platform is not attesting to its security state, but rather to its execution state, and this underlies all of the troublesome use cases, as well as a number of the practical difficulties, of the TCG world-view. One response to this is to replace standard TCG attestation with property-based attestation (PBA), which places the emphasis on deriving security properties from (potentially) elaborate trust models and conditional statements of security property dependencies. Herein the central rôle for IBC of trust and deriving consequences from precise trust models becomes clear.
Finally, we claim that the TCG's own remote attestation is most properly viewed in fact as a form of PBA, with a certain simple trust model and database of security properties. From this point of view, it becomes clear that IBC can have a much less restrictive range of applications than envisioned merely by the TCG. In fact, with the right ``trust infrastructure'' and sufficiently open software using and relying upon this infrastructure, IBC could actually realize some of the portentous early promises of the TCG for truly increasing the reliability of individual users' platforms and pushing back the apocalyptic rise of malware, especially if platforms and OSes virtualize and enforce some kind of signed code contracts.
This is a first draft of a free (as in speech, not as in beer, [Sta02]) (although it is free as in beer as well) textbook for a one-semester, undergraduate cryptology course. It was used for CIS 491 at Colorado State University Pueblo in the spring semester of 2021.
It's not clear that any other instructor would feel comfortable using this version, without a lot of adaptation. In fact, I usually find that when I write an open textbook like this one, during the semester in which I am teaching the class, what results is a little rough and has a few real gaps. After another semester teaching with this book, the second version (which could well be twice as long!) will likely be much easier to use by others.
Nevertheless, in the spirit of openness, I'm sharing this first draft as well: if you want to use it for self-study or in a class you are teaching, feel free to do so — just makes sure your seatbelt is fastened, as the ride might be a little bumpy at times. [That said, if you do use this and find typos, thinkos, or other issues, I would be grateful if you would tell me about them!]
I am releasing this work under a Creative Commons
Attribution-ShareAlike 4.0 International
license, which allows anyone who is interested to
share (copy and redistribute in any medium or
format) and adapt (remix, transform, and build
upon this work for any purpose, even commercially). These rights
cannot be revoked, so long as users follow the license terms,
which require attribution (giving appropriate
credit, linking to the license, and indicating if changes were
made) to be given and share-alike (if you remix
or transform this work, you must distribute your contributions
under the same license as this one) to be respected. See
creativecommons.org/licenses/by-sa/4.0 for all the details.
This version: 15 May 2021 14:27MDT.
Many children want to keep secrets.
Lovers on opposite sides of the globe want to whisper sweet nothings to each other over an international telephone system whose wires and fiber optic cables run under neighborhoods, city streets, fields, and forests, or over mountain passes and on deep sea beds.
Continent-spanning empires need to store secrets and issue commands to distant government agents and agencies which cannot be modified in transit from the imperial center to its far-flung agents.
Consumers want to buy goods from merchants in other time zones, giving their credit card numbers to those merchants in messages over the open Internet — which is, without some system for hiding the contents of those messages, about as safe as writing them on the sides of long-haul trucks as they go by on the highway.
Everyone needs a little cryptology.
The problem with crypto (as we shall call cryptology in this book) is that it has a reputation of being very hard and mysterious, as well as very easy to get wrong. While there are aspects of crypto that are connected to quite modern and complex theories — such as number theory, an old and deep branch of mathematics; complexity theory, a new(er) and subtle branch of computer science; and even quantum computation, a quite new wrinkle on a 100 year-old version of physics which is famously counter-intuitive — that are not particularly friendly to the novice, much of the over-all framing of crypto is perfectly easy to comprehend and to use.
We contend, further, that this straightforward comprehension of the important basics of cryptology is most easily acquired by actually working with cryptographic primitives, by doing actual coding projects to implement, or use others' implementations of, basic cryptographic ideas.
That is the subject of this book.
This version uses Python and some standard cryptographic libraries in Python to explore these cryptological ideas. It should be accessible to students with a solid basic comfort level with Python — but could also be used as a way to solidify Python knowledge in more beginning users of that language, particularly if those beginners had a friendly instructor or peers with whom to collaborate.
This PressBooks port of the Creative Commons Certificate course materials was created by Jonathan Poritz in December of 2019 and updated in May of 2020. It is based on the materials from iterations of the course offerings in Canvas from that period, including the most recent version as used in June, 2020.
The CC Certificate course, which involves a (mandatory) group discussion board, several assignments, and a final project, all graded by a trained facilitator, results in a Certificate of Mastery of Open Licensing issued by the Creative Commons organization. For those who cannot take the official course, it is hoped that this version of the course content may be useful for self- or group-study. In the spirit of using it in that way, the discussion topics and assignment statements from the original course are here re-stated as prompts for individual or group work.
Attribution Information:
Here are the the original Creative Commons Certificate course materials, which were
released by Creative Commons
under a Creative Commons Attribution 4.0 International license. Except for the
above-mentioned rephrasing of discussions and assignments (and
probably fewer than a dozen small changes in wording,
punctuation, or layout), this port should be merely a format
shift of the original, and therefore constitutes a copy in the
sense of copyright law [footnote: For more on how something which
looks a little different and has a few changed words should be
thought of as "just a copy," in the sense of the law ... see the
material in this course, below!]. Note that some images and
videos in the original, which are reproduced and/or linked here,
are not the works of the Creative Commons nor necessarily under a
CC BY 4.0 license; in such cases, the original materials have the
appropriate attributions, also reproduced here. All other
materials, including images, should be presumed to be part of the
original, with one exception: audio files attached to this
version are new recordings. To the extent that those audio
performances of this (CC-licensed) material have a performance
copyright, the audio performer (Jonathan Poritz) hereby releases
them under
a Creative
Commons Attribution 4.0 International license.
Thanks are hereby offered to the students in that class who offered many useful suggestions and found numerous typos. In particular, Julie Berogan has an eagle eye, and found a nearly uncountably infinite number of mistakes, both small and large — thank you!
This work is released under a CC BY-SA 4.0 license, which allows anyone who is interested to share (copy and redistribute in any medium or format) and adapt (remix, transform, and build upon this work for any purpose, even commercially). These rights cannot be revoked, so long as users follow the license terms, which require attribution (giving appropriate credit, linking to the license, and indicating if changes were made) to be given and share-alike (if you remix or transform this work, you must distribute your contributions under the same license as this one) imposed. See creativecommons.org/licenses/by-sa/4.0 for all the details.
This version: 13 May 2017 23:04MDT.
Figures often beguile me, particularly when I have the arranging of them myself; in which case the remark attributed to Disraeli would often apply with justice and force:[emphasis added]
"There are three kinds of lies: lies, damned lies, and statistics."
Here Twain gives credit for this pithy tripartite classification of lies to Benjamin Disraeli, who was Prime Minister of the United Kingdom in 1868 (under Queen Victoria), although modern scholars find no evidence that Disraeli was the actual originator of the phrase. But whoever actually deserves credit for the phrase, it does seem that statistics are often used to conceal the truth, rather than to reveal it. So much so, for example, that the wonderful book How to Lie with Statistics [Huf93], by Darrell Huff, gives many, many examples of misused statistics, and yet merely scratches the surface.
We contend, however, that statistics are not a type of lie, but rather, when used carefully, are an alternative to lying. For this reason, we use "or" in the title of this book, where Twain/Disraeli used "and," to underline how we are thinking of statistics, correctly applied, as standing in opposition to lies and damned lies.
But why use such a complicated method of telling the truth as statistics, rather than, say, telling a good story or painting a moving picture? The answer, we believe, is simply that there are many concrete, specific questions that humans have about the world which are best answered by carefully collecting some data and using a modest amount of mathematics and a fair bit of logic to analyze them. The thing about the Scientific Method is that it just seems to work. So why not learn how to use it?
Learning better techniques of critical thinking seems particularly important at this moment of history when our politics in the United States (and elsewhere) are so divisive, and different parties cannot agree about the most basic facts. A lot of commentators from all parts of the political spectrum have speculated about the impact of so-called fake news on the outcomes of recent recent elections and other political debates. It is therefore the goal of this book to help you learn How to Tell the Truth with Statistics and, therefore, how to tell when others are telling the truth ... or are faking their "news."
Education Is Not an App offers a bold and provocative analysis of the economic context within which educational technology is being implemented, not least the financial problems currently facing higher education institutions around the world. The book emphasizes the issue of control as being a key factor in whether educational technology is used for good or bad purposes, arguing that technology has great potential if placed in caring hands. Whilst it is a guide to the newest developments in education technology, it is also a book for those faculty, technology professionals, and higher education policy-makers who want to understand the economic and pedagogical impact of technology on professors and students. It advocates a path into the future based on faculty autonomy, shared governance, and concentration on the university's traditional role of promoting the common good.
Offering the first critical, in-depth assessment of the political economy of education technology, this book will serve as an invaluable guide to concerned faculty, as well as to anyone with an interest in the future of higher education.
The author gratefully acknowledges the work An Introductory Course in Elementary Number Theory by Wissam Raji [see www.saylor.org/books/] from which this was initially adapted. Raji's text was released under the Creative Commons CC BY 3.0 license, see creativecommons.org/licenses/by/3.0. This work is instead released under a CC BY-SA 4.0 license, see creativecommons.org/licenses/by-sa/4.0. (The difference is that if you build future works off of this one, you must also release your derivative works with a license that allows further remixes over which you have no control.)
This version: 7 May 2014 11:04MDT. Note this text will be frequently updated and improved as the author has time, particularly during and immediately after semesters in which it is being used in a class. Therefore please check back often to the website, which is www.poritz.net/jonathan/share/yaintt/.
This work is dedicated to my insanely hardworking colleagues at Colorado State University – Pueblo whose dedication to their students, their scholarship, and their communities is an inspiration. While I was working on the first version of this book, those colleagues stood up to some of the most benighted, ignorant administrative nonsense I have seen in the more than thirty years I have been involved in higher education. As MLK said, "The arc of the moral universe is long, but it bends towards justice." — It is selfless, intelligent, hard work like yours that is doing the bending.
Note, however, that once we broach the subject of these cryptologic algorithms, we take the time to make careful definitions for many cryptological concepts and to develop some related ideas of cryptology which have much more tenuous connections to the topic of number theory. This material therefore has something of a different flavor from the rest of the text — as is true of all scholarly work in cryptology (indeed, perhaps in all of computer science), which is clearly a discipline with a different culture from that of "pure" mathematics. Obviously, these sections could be skipped by an uninterested reader, or remixed away by an instructor for her own particular class approach.
Caution: In
good Bourbaki [A fictional mathematician and
author of many (non-fictional — they really exist) fine
mathematics texts, such as [Bou04]] style, where
this symbol appears in the text below, it indicates a place where
the reasoning is intricate and difficult to follow, or calls
attention to a common misinterpretation of some point.
This version, in PDF form, can be found at
https://www.poritz.net/jonathan/share/yaintt.pdf
while all the files to create custom versions can be found at
https://www.poritz.net/jonathan/share/yaintt/
— have fun with it, that's the point of the Creative Commons!
I wanted to take a faculty member and student's perspective on OER for just a moment, since the more formal definition is given on our one-page handout.
When I choose a textbook for, say, a calculus class, the easiest thing for me to do is to look over the offerings sent to me for free by various large textbook publishers. I pick one, the campus bookstore orders it and sells it on campus for a modest mark-up, resulting in a sticker price of around \$300.
With prices like that (common in STEM fields, and almost as outrageous in other areas), many students don't buy the book, or enroll in fewer classes and take more time to complete (as studies show is happening).
Textbooks are a failed market, in that the feedback between buyer and seller is broken, since the professor makes the purchase decision but the student pays the price. Many in this room like capitalism because this feedback mechanism produces better quality products for better prices -- but the virtues of competition with not accrue if the feedback link is broken!
Commercial publishers seek to influence those who make the decision — hence the ancillary materials like solutions manuals, PowerPoint decks for lectures, etc. — and also to increase prices as fast as they can without killing the goose that laid the golden egg.
This is why, since the 1980s when I was a student, textbook prices have increased by approximately 900%, as compared to a total increase in the consumer price index of about 200%.
Some scholars choose instead to write their own textbooks and simply to post them on their websites for anyone to use freely. [Actually, there is still an issue with copyright law, but a wonderful series of licenses called Creative Commons licenses exists which overcome this obstacle.]
For example, in the spring of 2017, I was teaching a standard intro to statistics class in Pueblo, and rather that requiring my students to buy the usual textbook at about \$180, I wrote a textbook which covered exactly what I wanted to cover, with very recent and engaging examples and problems and posted it to my website. Since I put a Creative Commons license on that book, my students don't need to worry about getting in trouble for printing out that webpage, nor do scholars at other institutions need to worry about copying that book for their own courses, and evening tinkering with it to their heart's content.
For faculty who don't have time or interest in writing a textbook, there are now great repositories on the `net of wonderful, CC-licensed textbooks which a faculty member can simply adopt or adapt to their class. OER are becoming part of a vast, public commons for everyone to use. For example, Dr Ragan teaches chemistry out of an OER textbook from a great repository called OpenStax.
So: broken market feedback has lead to prices which damage students' prospects. A relatively new approach of using CC-licensed OER allows for cheaper, better materials for students. All that we have to do is to change completely the culture of textbook selection and evaluation in every public institution of higher education in Colorado for our students to get this great benefit.
Changing cultures is not easy. The OER Council made a specific proposal to build a program which can help this happen.Then Emily was intending to say the following [note this material is ©2018 Emily Ragan and is posted here with her permission]:
Based on identified obstacles, the OER council made recommendations to create a Colorado OER Initiative with funding requested for three years. One of the most important aspects of the initiative is to provide grant funding to institutions and individuals to increase OER adoption and creation. 80% of the proposed budget goes to the grant program, which will directly benefit students through an increase in courses using OER.
To increase faculty awareness and effective use of OER we also proposed an annual OER conference for stakeholders, including faculty, librarians, and instructional designers.
Based on outcomes in other states, we estimate a four-times return on investment from grant funds each year. Once a course is switched to using OER resources it is likely to stay that way, allowing savings to continue into the future. \$450,000 in grant funding in year one could yield \$1.8 million in savings each year for a total of \$5.4 million from that year-one investment at the end of 3 years. The proposed initiative has a total cost of \$2.82 million and we estimate a \$16.2 million dollar savings after three years.
Substantial monetary savings for higher education students and their parents are one benefit. Other benefits include enhanced student outcomes and support for faculty innovation. It isn't appropriate to mandate that courses or faculty use OER, but we can raise faculty awareness of OER so faculty consider OER alongside other materials and make the best selection for each particular course. Funding would also motivate interested faculty to more quickly and effectively make a change to OER. A funded Colorado Open Educational Resources Initiative would have a substantial, positive impact on Colorado higher education students and the faculty teaching them.Textbooks are a perfect example of a market failure in that the consumer who pays the price for the product is not the person who chooses which product to purchase!
Textbook choice is in the hands of the individual professor (or, sometimes, a group of professors when a course will be taught in several sections) -- this is actually an important part of the faculty's academic freedom in the classroom and we should be very cautious about stepping on those toes.
Commercial publishers have an incentive to attract professors to their textbooks, with free instructor's editions, test banks, homework answer books, etc., but apparently little incentive to make prices increase in a reasonable way.
E.g., while there have probably been a number of improvements in the understanding of calculus and how to teach it since the first textbook [by Maria Gaetana Agnesi] was published in 1748, it is hard to believe the improvements in exposition since 1980 truly warrant a 900% increase in price.
OER Council Recommendations
Create a Colorado OER Initiative (COER)
The free software movement largely came out of university science departments at the beginning of the computer age, and has continued to provide tools for scientific research, communication, and education. In this talk, I will survey some of these tools and then concentrate on two particular areas in which I have been involved recently: open publishing (free textbooks!) and free on-line homework systems.
Key Findings
Over the last three years, CDHE and the OER Council have established a community of learning, practice, and innovation for educators exploring open education. Key findings suggest a meaningful current impact and promising future. Most significantly the below findings demonstrate the impact and potential of open education and OER in Colorado:
Key Findings
Over the last two years, CDHE and the OER Council have established a community of learning, practice, and innovation for educators exploring open education. Key findings suggest a meaningful current impact and promising future. Most significantly the below findings demonstrate the impact and potential of open education and OER in Colorado:
Key Findings
Over the past year, CDHE and the OER Council have established a community of learning, practice and innovation. Key findings suggest a meaningful current impact and promising future. Most significantly:
Overview
Open Educational Resources (OER) are freely available online teaching and learning materials accessible to students, instructors and self-learners. Contained in digital media collections from around the world, examples of OER include full courses, lectures, quizzes, classroom activities, pedagogical materials and many other assets.
Colorado's Open Educational Resources Council is a statewide body charged by the Legislature and the governor through SB 17-258 to develop recommendations for an OER initiative serving public higher education in the state of Colorado. This OER Council Report to the Joint Budget Committee includes a rationale for state investment in OER, an overview of successful OER initiatives in other states, a description of the current status of OER use in Colorado and structural and investment recommendations for a statewide OER initiative [See Appendix 1 for a three-year timeline.].
In order to develop impactful policy recommendations, this past year the OER Council collaborated with Western Interstate Commission on Higher Education (WICHE) Center for Educational Technologies (WCET) to understand the status and use of OER in Colorado. That project resulted in the analysis, Open Educational Resources in Colorado, by WCET Director of Open Policy Tanya Spilovoy, Ed.D. Data from Dr. Spilovoy's analysis is an integral part of this report to the JBC and her analysis, in its entirety, follows this report.
Research into OER benefits conducted by the council, and described in the following narrative, shows that increased adoption of OER significantly benefits students through cost savings, improved learning and increased student retention. Therefore, the council recommends launching and funding a Colorado OER Initiative (COER) for at least three years [See Appendix 1 for a three-year timeline.] with a total proposed budget of $2,820,070 [See Appendix 2 for budget details.] to:
In this paper, we argue that the approach of binary attestation is not privacy-friendly, scalable or open and vendor-neutral. The main criticism is that this approach needlessly discloses the complete configuration (i.e., all executed software) of a machine. The focus of binary attestation are the binaries instead of their security. We present a protocol and architecture for property attestation that resolves these problems. With property attestation, a verifier is securely assured of security properties of the verified platform's execution environment without receiving detailed configuration data. This enhances privacy and scalability since the verifier needs to be aware of its few required security properties instead of an huge number of acceptable configurations.
NOTE2: Despite extensive research, it remains unclear to me who owns the copyright on MAFTIA deliverables — perhaps it is some branch of the EU? — and the MAFTIA web site does not clearly answer this question. In cases where this could be a concern, I suggest contacting one of the senior (former) MAFTIA organizers or perhaps the EU Information Society and Media Directorate-General (see this web site).