Number of Exam Pages

advertisement
Faculty of Computer Studies
Course Code: T215B
Course Title: Communication and Information Technologies
Final Examination
First Semester
Date: TBC
Number of Exam Pages:
(including this cover sheet(
(
)
Time Allowed: 3 hours
Instructions:






Total Marks: 100
Total Number of Questions: 3
Marks Distribution: Part 1: 10 marks
Part 2: 40 Marks
Part 3: 50 Marks
Be sure you write your name and ID on the External Answer booklet.
External materials are NOT allowed
Calculator is ALLOWED.
1|Page
Part 1: Multiple Choice Questions: (10 marks)
Answer all the following Multiple Choice Questions.
1. The branch of science concerned with the concealment of information
A. Cryptanalysis
B. Cryptography
C. Cryptology
D. Encryption
2. An important point to bear in mind when considering ________ is that it is not
constant over time.
A. Convenience
B. Identity
C. Reliability
D. Acceptability
3. Privacy as ________: we might consider some of our behavior private in that it is
‘up to us’ and no business of others (where those ‘others’ may range from the
state to our employers)
A. Freedom to be ‘left alone’
B. Control of personal data
C. Self-determination
D. None of the above.
4. The science of breaking codes and ciphers is _______
A. Cryptanalysis
B. Cryptography
C. Cryptology
D. Encryption
5. ________________are the ones most commonly used by fingerprint recognition
systems.
A. Lake and independent ridge
B. Termination and bifurcation
C. Island and spur
D. Spur and crossover
6. One way to decouple from the linguistic patterns of the plaintext is to encrypt with
a cipher that uses a succession of different keys. An example of this is
A. Kirshoff cipher
B. Volta cipher
C. Vigenère cipher
D. None of the above
7. One of the following does not being stored on the magnetic stripe of the card.
A. CVV1
B. CVV2
C. PVV
D. Aand C
2|Page
8. When two sinewaves having the same frequency, peak amplitude and
____________, then they cancel each other completely.
A. in phase
B. completely out of phase
C. not in phase
D. Band C
9. A tuning fork has a frequency of 380 Hz. What is the wave length of sound wave
generated by the tuning fork? Take the speed of sound to be 340 meters per
second.
A. 0.89 m
B. 1.12 m
C. 1.29 m
D. none of the above
10. A sound wave has a peak to peak amplitude of 10 µPa what is its r.m.s.
amplitude?
A. 3.54 µPa
B. 7.07 µPa
C. 5 µPa
D. none of the above
Part 2: Essay Questions: (8x5 = 40 marks)
Answer ONLY 8 out of 10 questions
1. The decision maker of biometric security system, it decides whether the input
template and the stored template match based on the similarity value from the
matcher, the decision maker must be able to tolerate between Intra-class
differences and Inter-class differences.
A. Define both of Intra-class differences and Inter-class differences? (2
marks)
Intra-class differences: The differences between the templates of the same
individual.
Inter-class differences: the differences between the templates of different
individuals
B. What are 3 reasons for intra-class variations? (3 marks)
-
Displacement: different parts of the fingertip are presented to the sensor.
-
Rotation: the fingertip is presented to the sensor at a different angle.
3|Page
-
Pressure of the impression: the finger is pressed on the sensor with a different
force.
-
Skin condition: on different occasions the fingertip may be dry, wet, scratched or
dirty.
-
Condition of the sensor surface: on different occasions the surface may be
clean, dirty or greasy.
-
Feature extraction accuracy.
2. The thresholds used in biometric recognition systems set the balance point
between security and convenience, based on that differentiate between false
non-match and false match?
-
False non-match: When a threshold is set too high biometric data from the same
person can appear not to match because of slight variations
-
False match: When a threshold is set too low different biometric data can appear
to match when they are not the same
3. Define Encryption, Cryptology, Cryptography, Cryptanalysis?
-
Encryption is a process by which information is changed in some systematic way
so as to hide its content from everyone except its intended recipient. (2 marks)
-
Cryptology: The branch of science concerned with the concealment of
information, a word that has its roots in Greek from kryptos (hidden) and logos
(word). (1 mark)
-
Cryptography: the science of creating codes and ciphers. (1 mark)
-
Cryptanalysis: the science of breaking them. (1 mark)
4. Using a computer that can perform 1012 calculations a second, how long
would it take to try all possible permutations (Brute Force Attack) of 5 different
letters, express your answer in ns?
5! = 5x4x3x2x1 = 120
120 / 10^12 = 0.12 ns.
5. The exclusive-or (XOR) takes two binary input bits and combines them to form
an output bit.
A. If the first input is an 8 bit sequence of 11001100 and the second input is
00110011, calculate the output? (2 marks)
4|Page
Input 1
11001100
Input 2
00110011
output
11111111
B. If output is XORed once again with the first input, what will be the new
output, what is the relation between the new output and the second input?
(3 marks)
output
11111111
Input 1
11001100
Output 1
00110011
(2 marks) for output 1)
The new output and the second input are the same. (1 mark)
6. A Combined Face and Fingerprint biometric system for more security, assume
that the following values have been obtained for the two systems separately:
-
the FMR for the face subsystem is 4%
the FNMR for the face subsystem is 9%
the FMR of the fingerprint subsystem is 1%
the FNMR of the fingerprint subsystem is 7%.
A. What is the FNMR of the combined system? (3 marks)
FNMRC = FNMR1 + FNMR2 – (FNMR1 x FNMR2)
FNMRC = 9% + 7% – (9% × 7%) = 16% – 0.63% = 15.37%.
B. Based on the value you calculated, what do you conclude? (2 marks)
Fewer illegitimate users will be allowed access (More security), but more
legitimate users will be denied access (less convenience).
7. A. The level of security afforded during a TLS/SSL
number of factors. What are they? (3 marks)
-
The browser application used at the client
The version of TLS/SSL used to set up the connection
Proper authentication of the digital certificate
B. What TLS/SSL stands for? (2 marks)
-
Transport Layer Security (TLS)
and Secure Sockets Layer (SSL)
5|Page
session depends on a
8. The data stored in the magnetic stripe of a standard ID-1 payment card
includes: Card Verification Value 1 code (CVV1), CVV2, and PIN Verification
Value – PVV. What are the differences between them?
-
-
CVV2 is printed on the card. (1 mark)
Card Verification Value 1 code (CVV1) used to support the authenticity of the
card and it is recorded electronically on the card (2 marks)
Any of the following (2 marks)
PIN Verification Value (PVV) is an encrypted representation of the
corresponding account PIN and it is created by the card issuer.
PVV is used to verify the user-entered PIN when, for example, you are using a
bank ATM.
9. In an ATMmagnetic stripe card transaction, a derived PIN Verification ValuePVV (the processing of which involves the user’s entered PIN in combination
with other account data and a one-way function) is compared with the PVV for
the account (stored on the magnetic stripe and in a bank’s database).
Plaintext PINs are not used as the basis of this comparison. Explain why a
ciphertext representation (PVV) rather than a plaintext representation of a PIN
should be used for storing the PIN data on a magnetic stripe (only) card?
A PVV is a ciphertext representation of a PIN and so can be included in the
encoded information on a card’s magnetic stripe. If a PVV is accessed by a
fraudster, the process used to create the PVV, which includes the use of a oneway function, should ensure that the PIN cannot be accessed. It would certainly
be unsafe to include the plaintext version of the PIN within the magnetic stripe
data.
10. Describe in details how the transaction occur In a Dynamic Data
Authentication (DDA)?
-
-
The terminal sends a “challenge” to the card.
o A challenge is in the form of a message sent by the terminal to the
card.
o The message incorporates unpredictable data such as that derived
from the particular transaction being undertaken.
The card responds to the challenge it receives by returning the challenge data
to the terminal encrypted with its own private key.
If the decrypted response received from the card matches the terminal’s
original copy of the challenge data, the card is dynamically authenticated to
the terminal.
6|Page
Part 3: Problems: (50 marks)
Answer ALL the following questions questions
1. Two fingerprint images are to be matched using the minutiae-based matching
methods. Assume there are only 10 minutiae in each image. After the images are
translated and superimposed, 10 minutiae pairs are identified and their
differences are evaluated. Table below shows the differences of the minutiae
pairs. (10 marks)
Pair Number
Difference
1
0.12
2
0.01
3
0.03
4
0.02
5
0.00
6
0.02
7
0.04
8
0.03
9
0.01
10
0.04
A. Assume the threshold is set to 80%, which means that the two fingerprints will
be considered as a match only if the differences of at least 8 out of the 10
pairs are at or below the acceptable difference. Also assume the acceptable
difference is set to 0.05. Will the two fingerprints be considered a match, show
your work in details? (5 marks)
Acceptable differences = 9
Acceptable differences% = (9/10) *100% = 90%
90% > 80%
 Match.
B. If the threshold is now raised to 90% and the acceptable difference is lowered
to 0.03, what happens to the match result? (5 marks)
Acceptable differences = 5
Acceptable differences% = (5/10) *100% = 50%
50% < 90%
 None Match.
2. Use the Caesar cipher with digraph coding to encrypt the plaintext “netwar”,
assuming a key of 422. Use table below for codes of letters (20 marks)
c ≡ p + K mod 676
c ≡ p + 422 mod 676
‘ne’ encryption:
7|Page
pne = pn x 26 + pe = (13 x 26) + 4 = 338 + 4 = 342 (1 mark)
cne ≡ pne + K mod 676 ≡ 342 + 422 mod 676 ≡ 764 mode 676 ≡ 88 mod 676 (2marks)
88/26 = 3 + 10/26
(1 mark)
P1 = 3 equivalent to letter ‘D’ (0.5 mark)
P2 = 10 equivalent to letter ‘K’ (0.5 mark)
The ciphertext digraph of ‘ne’ is ‘DK’ (1 mark)
‘tw’ encryption:
Ptw = pt x 26 + pw = (19 x 26) + 22 = 494 + 22 = 516
Ctw ≡ ptw + K mod 676 ≡ 516 + 422 mod 676 ≡ 938 mode 676 ≡ 262 mod 676
262/26 = 10 + 2/26
P1 = 10 equivalent to letter ‘K’
P2 = 2 equivalent to letter ‘C’
The ciphertext digraph of ‘ne’ is ‘KC’
‘ar’ encryption:
Par = pa x 26 + pr = (0 x 26) + 17 = 0 + 22 = 22
Car ≡ par + K mod 676 ≡ 22 + 422 mod 676 ≡ 444 mode 676
444/26 = 17 + 2/26
P1 = 17 equivalent to letter ‘R’
P2 = 2 equivalent to letter ‘C’
The ciphertext digraph of ‘ne’ is ‘RC’
So ‘netwar’ is encrypted as ‘ DKKCRC’ (2 marks)
3. The figure below represents a sound signal propagates in water as medium,
answer the following questions: (20 marks)
A. Consider each square of the distance axis represents 0.25m, calculate the
wavelength (λ) in meters? (2 marks)
Wavelength = 5 squares x 0.25 = 1.25 m
8|Page
B. Calculate the peak to peak pressure in µPa, consider each square of the
pressure axis represents 0.2 µPa? (2 marks)
Peak to peak pressure = 14 squares x 0.2 = 2.8 µPa
C. What is the root-mean square (r.m.s.) amplitude? (5 marks)
Peak amplitude = peak to peak / 2 = 2.8 / 2 = 1.4 µPa (2 marks)
r.m.s. = peak amplitude / √2 = 1.4 / √2 = 1 µPa (3 marks)
D. If the signal is propagating in water at temperature of 20 (oC) and the speed of
with a speed of 1481 m/s, what is the frequency of sound signal? (2 marks)
f = v / λ = 1481/1.25 = 1184.8 Hz.
E. Calculate the period of signal in seconds and milliseconds? (3 marks)
T = 1/f = 1 / 1184.8 = 0.000844 s (2 marks)
= 0.844 ms (1 mark)
F. If the same signal propagates in air with a speed of 340m/s, calculate the
period of signal in s and ms? (3 marks)
T = λ / v = 1.25 / 340 = 0.00368 s (2 marks)
= 3.68 ms (1 mark)
G. Which case (water or air) the signal has higher frequency? (3 marks)
f(air) = 1/T= 1/ 0.00368 = 272Hz (2 marks)
1184.8 Hz > 272Hz
 f(water)>f(air). (1 marks)
End of Final
____________
9|Page
Download