CITY UNIVERSITY OF HONG KONG Course Code and Title: DCO20230 Internet Security Session: Semester B, 200X-200Y Time Allowed: Two Hours This paper has Six pages. Instructions to Candidates: (A) Answer ALL questions in Section A. (B) Answer Three questions in Section B. Materials, aids & instruments permitted to be used during examination: Portable battery operated calculator 1 Section A: This is a compulsory Question. [25 marks] a) Briefly describe computer security together with three objectives. [5 marks] b) You are assigned to design a new server room to house six servers in a windowless room that is located at the end of corridor. List two items that you will consider to install in this room to prevent fire. Support your suggestions with brief explanation. [6 marks] c) Given the plaintext is 3D 4F 2E 15 (32 bits) in hexadecimal and the key is 2F 3E (16 bits) 16 bits, determine the ciphertext in hexadecimal if exclusive-or is applied for this encryption. [10 marks] d) Security Socket Layer (SSL) is commonly used in transport layer to encrypt messages between server and browser. Briefly explain why SET (Secure Electronic Transaction) is still needed. [4 marks] 2 Section B Question 1 Choose three questions out of five. [25 marks] a) State the purpose of IPSEC. [3 marks] b) A plaintext checksum is used for a security system as follows. The checksum will then encrypted. A hacker finds that the checksum for $123 and $654 will produce the same value. He then modifies the content of data. State a proposal to fix this problem. [6 marks] c) It is claimed that keyed hash is more secure, explain with a diagram why it is difficult for the hacker to reproduce one-way hash value. [8 marks] d) When sending out a message, we can either apply for cryptographical checksum, cryptographical encryption or both. Use an example to differentiate cryptographical checksum from cryptographical encryption. [8 marks] 3 CITY UNIVERSITY OF HONG KONG Course Code and Title: DCO20230 Internet Security Session: Semester B, 200X-200Y Time Allowed: Two Hours This paper has Four pages. Instructions to Candidates: (A) Answer ALL questions in Section A. (B) Answer Three questions in Section B. Materials, aids & instruments permitted to be used during examination: Portable battery operated calculator 4 Section A: This is a compulsory Question. a) [25 marks] Briefly describe computer security together with three objectives. [5 marks] Computer security is a protection that is afforded to an information system in order to attain the applicable objectives or preserving the integrity, availability and confidentiality of information system resources b) You are assigned to design a new server room to house six servers in a windowless room that is located at the end of corridor. List two items that you will consider to install in this room to prevent fire. Support your suggestions with brief explanation. [6 marks] The two items are smoke detectors and fire extinguisher. The use of smoke detectors is to detect fire to alert the people. To place a fire extinguisher (ideally non-water based) near the server room is to extinguish fire. [2 c) Given the plaintext is 3D 4F 2E 15 (32 bits) in hexadecimal and the key is 2F 3E (16 bits) 16 bits, determine the ciphertext in hexadecimal if exclusive-or is applied for this encryption. [10 marks] The key is: 00101111 00111110 The binary pattern of 3D 4F 2E and 15 is: 00111101 01001111 00101110 00010101 The ciphertext is: 00111101 01001111 00101110 00010101 (plaintext) 00101111 00111110 00101111 00111110 (key) Use Exclusiveor 00010010 01110001 00000001 00101011 or 12 71 01 2B in hexadecimal d) Security Socket Layer (SSL) is commonly used in transport layer to encrypt messages between server and browser. Briefly explain why SET (Secure Electronic Transaction) is still needed. [4 marks] 5 SSL is a general purpose protocol to safeguard server and browser, while SET is a specialised protocol for safeguarding credit-card-based transaction. SSL is insufficient to provide protection between user, merchant and banks, as a pair of keys is used to encrypt and authenticate the message, while SET provides more secure measure as two pairs of keys for encryption and authentication separately are used. [4 marks with clear differentiation between SET and SSL, 2 marks if the explanation is correct but not clear enough, 0 if explanation is incorrect.] 6 Section B Choose three questions out of four. Question 1 [25 marks] a) State the purpose of IPSEC. [3 marks] IPSE is a general purpose of security protocol at the IP layer to protect traffic between hosts over the Internet. [3 marks for clear explanation and 0 mark without mentioning the IP layer] b) A plaintext checksum is used for a security system as follows. The checksum will then encrypted. A hacker finds that the checksum for $123 and $654 will produce the same value. He then modifies the content of data. State a proposal to fix this problem. [6 marks] We can apply one-way hash to fix the above problem. One-way hash function is checksum like functions, but is explicitly designed so that an attacker cannot construct a forged message (false) message that yields the same result. One-way hash functions try to generate a fingerprint of data. The function is sensitive to any change in the data. [6 marks showing that students understand the limitation of checksum and the application of one-way hash] 7 b) It is claimed that keyed hash is more secure, explain with a diagram why it is difficult for the hacker to reproduce one-way hash value. [8 marks] The block diagram is shown as follows. Unlike simple hash function, it combines the secret key of the sender. The data being sent combines the secret key. The sender appends a secret key to the message contents and compute a one-way hash. The sender then sends the message data plus the hash. The recipient uses the same key to re-compute and validate the hashed value. [4 marks for correct diagram and 4 marks for explanation. Deduce 1 mark for each incorrect item in the diagram] c) When sending out a message, we can either apply for cryptographical checksum, cryptographical encryption or both. Use an example to differentiate cryptographical checksum from cryptographical encryption. [8 marks] Cryptographical checksum detects changes in a protected message. It will not apply to the data, but append a checksum that is encrypted to seal the message against changes. Cryptographical encryption is to encrypt the data being sent. For example, Alice is ending a data $123 to Bob. The system should detect the checksum of $123 and find that it is 412. Alice will send a message containing 8 $123 + encrypted value of 412 (say t&6). Bob will receive the message $123 and he will then re-compute the checksum and use the same key to encrypt to see whether it produce t&6, it means there is no change. In the above case, the message $123 can be encrypted as well. 9