cs772MidtermFall15

advertisement
CS 772/872
Network and Systems Security
Fall 2015
Midterm Exam
Time 2 & 1/2 hours
Open Book & Notes
Name:
Login:
Each Question is 20 points.
Show your output in HEX not in binary.
For convenience here is the HEX to binary table:
0
1
2
3
4
5
6
7
0000
0001
0010
0011
0100
0101
0110
0111
8
9
a
b
c
d
e
f
1000
1001
1010
1011
1100
1101
1110
1111
1. The following cipher message was produced using the Rail Fence with 4 rails:
'ch_ns_a5set72s1tds7_u'
What is the corresponding plain text?
2. Assume we need to encrypt one data block of all 0s with an encryption key of all 0s.
Which of the following Algorithms produce a cipher block of all 0s. Explain why?
Data Encryption Standard (DES)
International Data Encryption Algorithm (IDEA)
Advanced Encryption Standard (AES)
Stream Cipher ( RC4 )
3. Assume we have two data blocks of all 0s and an encryption key of all 0s.
Consider the following block chaining methods with IV block of all 0s .




Cipher Block Chaining (CBC)
Output Feedback Mode (OFB)
Cipher Feedback Mode (CFB)
Counter Mode (CTR)
Fill in the each entry in the following matrix with either I or D where:
I
The two cipher blocks are Identical.
D The two cipher blocks are Different.
CBC
OFB
DES
IDEA
AES
Explain your answer only for your I entries.
CFB
CTR
4.
A. Assume the input data block in DES is:
f0 f0 f0 f0 f0 f0 f0 f0
Show the data after the IP
B. In AES, show the result of replacing the following column using MixColumn
operation:
ff
ff
ff
ff
5.
A.
Assume Dr. Wahab like to email all of you the following message
M : “No class next Wednesday”
He may use one of the following two options to convince you that M is not fake or all
altered by trudy:
Option 1:
Use a password P that he shared with all of you: oducsc
He computes the message digest d of M|P, then email all of you both M and d.
Option 2:
Since the message is short (< 128 bytes) he uses his private key to sign M to produce the
signature s of M. His public key is posted at a known place to all of you. He then email all
of you s.
Which option is more secure and why?
B.
Show the open ssl command to authenticate M in both options.
Assume:


He used md4 to compute the message digest d and is emailed as a hex file.
His public key file is wahabPublicKey and s is emailed as a base64 file.
Download