solution

advertisement
Name:
TEST 1
CSCE 522 – Fall 2002
September 25, 2002
Name:
Major
SSN (last 4 digits):
Answer the following questions. Be brief and precise, please.
You have 1 hour 15 minutes to finish the exam.
1. 14 points
Explain how Diffie-Hellman works. What is the man-in-the-middle attack against DiffieHellman?
Protocol for A and B want to agree on shared secret key:
 A and B agree on two large numbers n and g, such that 1<g<n
 A chooses random x and computes X=gx mod n and sends X to B
 B chooses random y and computes Y=gy mod n and sends Y
 A computes k= Yx mod n
 B computer k’= Xy mod n
 Note: k =k’= gyx mod n
2. 6 points
What is column cipher? Briefly explain how can it be broken.
Transposition.
 Letters of the message are rearranged
 Break patterns, e.g., columnar transposition
Plaintext:
this is a test
this
isat
tiehssiatst!
1
Name:
est!
 Advantages: easy to implement
 Disadvantages:
 Trivially broken for known plaintext attack
 Easily broken for cipher only attack
3. 15 points
Briefly explain DES (key, plaintext and cipher size, main steps of DES)? Outline one cycle of
DES.
(see answer for sample 1)
4. (5 points)
Briefly show how RSA provide confidentiality?
III. Think! (40 points)
Undergraduate students!!! Answer only question 1 or question 2 in this section but not both!
Question 3 need to be answered by everybody.
1. 15 points
 Assume an attacker has random pairs of (P,C), that is plaintext messages and matching
ciphertext messages. What is the meet-in-the middle attack with DES double encryption? (5)
P
E
K1
E
K2
D
D
K2
K1
C
(see answer to sample 1)
2
Name:

Explain how DES electronic code book (ECB) works. (5)

Is DES in ECB mode vulnerable for meet-in-the middle attack? Why or why not? (5)
2. 15 points
Show how secret-key cryptosystem may provide message authenticity (to a third party) using a
trusted server.
Trusted
Server
3
Download