Uploaded by abdelrazekali66

mid2022

advertisement
Faculty: Computers and Informatics
Class Year: 2021/2022
Specialization: Information Technology
Subject Name: Network Security
Subject Code: IT460
Department: Information Technology
Midterm Exam
Date: 19 April 2022
Time Allowed: 60 min.
No. of Pages: 2
No. of Questions: 4
Full Mark: 40 Points
:‫السكشن‬
:‫األسم‬
Answer the following questions:
1. Perform the following RSA key generation steps. Each step must satisfy the requirements for a
legitimate RSA key.
[5 points]
a) (1 points) Suppose n is 55. Find suitable p and q values.
b) (1 points) Compute Φ(n).
c) (3 points) If d = 7, compute a valid value for e and specify the public and private keys.
9 4
2. Encrypt the message ”AB” using the Hill cipher with the key 
 Show your calculations and the
5 7
result.
[5 points]
3. Draw the graph of a single round of DES algorithm?
1
[10 points]
:‫السكشن‬
:‫األسم‬
4. True or False Questions:
[20 points]
1. The OSI security architecture provides a systematic framework for defining security attacks,
mechanisms, and services. (T )
2. Security attacks are classified as either passive or aggressive. (F )
3. Authentication protocols and encryption algorithms are examples of security mechanisms. (T )
4. The emphasis in dealing with active attacks is on prevention rather than detection. (
F)
5. The data integrity service inserts bits into gaps in a data stream to frustrate traffic analysis
attempts. (
F)
6. Symmetric encryption remains by far the most widely used of the two types of encryption. ( T )
7. With the use of symmetric encryption, the principal security problem is maintaining the secrecy
of the key. (
T
)
8. Monoalphabetic ciphers are easy to break because they reflect the frequency data of the original
alphabet. (
T)
9. As with Playfair, the strength of the Hill cipher is that it completely hides single letter
frequencies. (
T)
10. The one-time pad has unlimited utility and is useful primarily for high-bandwidth channels
requiring low security. (
F)
11. Confusion seeks to make the statistical relationship between the plaintext and ciphertext as
complex as possible in order to thwart attempts to deduce the key. (
T)
12. A prime concern with DES has been its vulnerability to brute-force attack because of its
relatively short key length. (
T)
13. AES uses a Feistel structure. (
F)
14. DES is a block cipher intended to replace AES for commercial applications. ( F
15. There are no practical cryptanalytic attacks on 3DES. (
T
)
)
16. It is possible to convert a block cipher into a stream cipher using cipher feedback, output
feedback and counter modes. ( T
)
17. The XTS-AES mode is based on the concept of a tweakable block cipher. (
T
)
18. Asymmetric encryption utilizes only a public key for encryption and decryption. (
F
)
19. Asymmetric encryption can be used for confidentiality but not for authentication. (
F
)
20. Public-key encryption is more secure from cryptanalysis than symmetric encryption. (
Best Wishes. . .
2
F)
Download