SI110 Spring AY13 Alpha:___________ Name:________________________________

advertisement
SI110 Spring AY13
choose one:
(or more)
Alpha:___________
□ Received
no help
Homework:
Name:________________________________ Page 1 of 2
□ Received help from:
□ Collaborated with:________________________________________
/SI110/Models and Tools/Hashing & Digital Cryptography
1. Suppose I have a secret string S, and all you have is a scrambled Rubik’s Cube that is
the hash of S, i.e., all you know is what the hashed cube looks like. Explain what you
would have to do in order to find any string that hashes to the same value as S?
10 / 8 / 6 / 0
2. Contrast the security of storing hashes-of-passwords on a system, vs. storing just the
10 / 8 / 6 / 0
passwords themselves.
3. Check each box below for which the protective measure labeling the column helps
30 / 24 / 18 /
protect against attack-type that labels the row. Note: read about online/offline attacks,0
password stretching, throttling, etc. in the notes before you answer this!
| salting
|throttling |password
|two-factor
|choosing a
| & hashing |& lock-out |stretching |authentication |"stong" password
--------------------------------------------------------------------------------an online
|
|
|
|
|
attack
|
|
|
|
|
--------------------------------------------------------------------------------an offline |
|
|
|
|
attack
|
|
|
|
|
--------------------------------------------------------------------------------an attacker |
|
|
|
|
who has
|
|
|
|
|
successfully|
|
|
|
|
installed a |
|
|
|
|
keylogger
|
|
|
|
|
--------------------------------------------------------------------------------an attacker |
|
|
|
|
who has kid-|
|
|
|
|
napped you &|
|
|
|
|
is threaten-|
|
|
|
|
ing you with|
|
|
|
|
torture
|
|
|
|
|
--------------------------------------------------------------------------------4. From the in-class password activity: What things should any responsible website do
to protect the passwords (and thus the identities) of its users?
10 / 8 / 6 / 0
5. Make up a strong password. What properties should a good password have ?
10 / 8 / 6 / 0
password
SI110 Spring AY13
Alpha:___________
Name:________________________________ Page 2 of 2
6. Suppose I'm a bad guy with an account at amazen.com, which hashes passwords, but does
not use salt. I steal the password file from amazen.com and start looking through it. I
notice that the hash for user honeybadger is the same as mine.
a. What does that mean and why is it a lucky break for me, the bad guy?
10 / 8 / 6 / 0
b. Does honeybadger care?
c. Why wouldn't this happen if amazen.com used "salt"?
10 / 8 / 6 / 0
7. Explain why it that, even if a website uses hashing & salting, its users' passwords
would still be in danger if it used http instead of https for the login pages.
Note: the answer "because https is insecure" isn't sufficient. You must explain
specifically what's insecure in this particular case?
10 / 8 / 6 / 0
Page 2 of 2
Download