Test 4 Study Guide

CSC 360
Fall, 2014
Test 4 Study Guide
What is the purpose of CRC calculations?
Give a specific example of where the CRC process is used
Give one fact about CRC
How many zeroes are added to the dividend?
What is used as the divisor: the polynomial or the message?
What is used as the dividend: the polynomial or the message?
What is the rule as to how many exclusive-OR gates will be used in the hardware
Be able to calculate the CRC bits either by long division or by hardware shifting
Chapter 10: Network Security
 Three security goals: confidentiality, integrity, and availability
 Know a specific threat to each of the above
 What is cryptography?
 What is steganography?
 Give an example of each of the above
 What is a symmetric-key cipher?
 What is an asymmetric-key cipher?
 How do these differ? See page 746 for more of a comparison.
 Know the terms: plain text, cipher text, encryption, decryption
 Know the substitution cipher of Figure 10.4
 Know the polyalphabetic cipher of Example 10.4
 How do the two cipers above differ in operation?
 Know the transposition cipher of Figure 10.6
 Alice wants to send an e-mail to Bob using an asymmetric-key cipher. What key does she
need to do this?
 Know general details of RSA cryptosystem – pages 748-751
 What type of algorithm is used to preserve message integrity? Page 751
 Explain the purpose of a digital signature
 What protocols provide security at the Application Layer?
 What protocols provide security at the Transport Layer?
 Why is security needed at the Network Layer (three reasons)? Page 782
 What is the name of the collection of protocols that provide security at the Network
 What is a packet-filtering firewall?
 What is a proxy firewall?
 Browse over the Questions and the Problems at the end of Chapter 10 (some of these
were assigned as homework)