Tutorial Sheet 06

advertisement
CSE 2500 Computer Security and Privacy
Tutorial Sheet 06
Q1) Given a modular exponentiation algorithm for n-bit integers that needs about n3
operations, how much does performance deteriorate by moving from 512-bit to 1024-bit
RSA?
Q2) Consider a block cipher algorithm with the following properties:
- Input and output block length of 64 bits and the key size is 56 bits
- Given a key K, the key scheduling requires 2 microseconds (2 x 10 -6 secs)
- After the key scheduling produces all the sub-keys (if required), the
encryption of a single block of 64 bits block takes 0.5 microseconds.
Compute the following information:
- The total time required (of course in microseconds) to encrypt 1MBytes (2
20
bytes) of data.
- Given 2 values C and M such that C = EK(M) under the unknown key value
K, how many years (at most) are required to crack the cipher on a single
computer.
Q3) Consider the following scheme of encryption and decryption scheme:
- Let P be a data block of arbitrary length.
- EK(P) and DK(P) represent the secret key encryption and decryption
algorithms of a secret key cryptosystems (such as DES) where K is the secret
key.
- PEU (P) and PDV(P) represent the public-key encryption and decryption
algorithms of a public-key cryptosystem (such as RSA), where U is the public
key and V is the private key of the user.
- Let X and Y be the public and private key of Srini in the above public-key
cryptosystem.
Consider the following sequence of operations (and explain what are they in English)
-
C = EK(P)
destroy P
D = PEU (K)
E = PEX (K)
destroy K
F = { C, D, E }
Is it possible to obtain P from F knowing V? If so how?
Is it possible to obtain P from F knowing Y? if so how?
Is it possible to obtain V if we know Y? If so how?
1 of 2
-
Is it possible to obtain P from F if we lose V? If so how?
Is it possible to obtain P from F if we lose Y? If so how?
Is it possible to obtain P from F if we lose both V and Y? If so how?
Q4) Consider a password system which uses all the 102 printable characters of the
English (or American) key board and the password is of 8 characters long.
- How many distinct passwords are possible under the above scheme? (give
the numbers approximately as a.b x 10 c).
- If the password scheme is limited to 26 lowercase English alphabets only (still
password length remains as 8 characters), how many passwords will there be?
- If the password length is limited to 6 characters (still the number of
characters is 102), how many passwords will there be?
Q5) Think
of application(s) where private key encryption may not be suitable.
Q6) Assume that passwords have length six and all alphanumerical characters, upper and
lower case, can be used in their construction. How long will a brute force attack take on
average if:
- it takes one tenth of a second to check a password?
- it takes a microsecond to check a password?
Q7) Passwords are entered by users and checked by computers. Thus, there has to be
some communications channel between user and computer. So far we have taken a very
abstract view of this channel and assumed that it exists and that it is adequately secure.
When this assumption is justified? When it is not justified?
2 of 2
Download