Part A)Choose the suitable answers (1 mark each) 1.MIM is type of attackers who get the message illegally and retransmitting again to? a) New recipient b) The sender. c) The originally-intended recipient. d)d.None one of them. 2.What is a one way hash function? It is a mathematical function which a) takes a variable-length input string and converts it into a variable-length binary sequence. It is hard to find two strings that would produce the same hash value. b) takes a variable-length input string and encrypts it. This hash can then be decrypted to get the original message, proving it came from the sender. c) takes a variable-length input string and converts it into a fixed-length binary sequence. It is hard to find two strings that would produce the same hash value. d)is easy to calculate but hard to invert because it is difficult to calculate the input to the function given its output. 3.What does “symmetric-key cryptography” mean? An encryption system in which the sender and receiver of a message a) share a public and a private key that are used to encrypt and decrypt the message b) share one public key that is used to encrypt and decrypt the message. c) share two common keys that are used to encrypt and decrypt the message. d) share a single, common key that is used to encrypt and decrypt the message. 4.What is a “digital signature”? An information that is encrypted with an entity’s a)public key and is appended to a message to assure the recipient of the encryption and integrity of the message. b)private key and is appended to a message to assure the recipient of the authenticity and integrity of the message. c)private key and is appended to a message to assure the recipient of the encryption and integrity of the message. 5. mutual authentication is a) add one to the checksum, encrypt it with the session key and send it back to Attacker b) session key used to add cryptographic checksums to the messages sent between A and B c) add encryption, best approach in all cases 6.A VPN typically provides a remote access link from one host to another over a) An intranet. b) A modem. d) A network interface card. d) The Internet. 7. What is a digital certificate? a)private key. It is issued by a certificate authority. b)private key. It is issued by a repudiation authority. c)public key. It is issued by a certificate authority. d)public key. It is issued by a repudiation authority. 8. Which technology should be used to keep a file content private during transmission ? a) SSH b) SSL c) PGP d) Encrypted filesystem 9. Which is not a feature of the SSL protocol? a) Verifying the server is actually the server you think it is. b) Verifying the client is actually the server you think it is. c) Preventing data in transit from being observed in clear-text. d) Transparently enabling SSL connections to non-SSL enabled servers. 10. Intermediate systems, such as ---------- treat the encrypted part of the packets purely as payload. a) switches b) routers c) servers d) getaways Part B) Give the full word for the following abbreviation(1 mark each) 1.MD5 ____________________________________ 2.SSH_____________________________________ 3.DES_____________________________________ 4.RSA_____________________________________ 5.SHA_____________________________________ 6.ITEF_____________________________________ 7.HMAC___________________________________ 8.SHA1____________________________________ 9.SSL______________________________________ 10.TLS_____________________________________ Part C) Table matching (1 mark each) SSH prevents from DNS spoofing encrypts the data in an IP datagram and provides authentication, integrity, and antireplay services IPsec IP @, packet sequence numbers , other personal information to create new packets appear coming from actual U C Spoofing Usually replaces the sender IP address with a different address Secure Shell The amount of time, effort and resources necessary to break a cryptosystem Work factor Specifies the length of the AH header Payload Length Part D) Answer any questions within question 1 1. What are the differences between SSH1 and SSH2(6 marks) Cipher SSH1 SSH2 DES yes no 3DES yes yes IDEA yes no Blowfish yes yes Arcfour no yes Cipher SSH1 SSH2 RSA DSA yes no yes yes • SSH1 and SSH2 encrypt different parts of the packets (see Table 1 and Table 2) • • SSH1 uses server and host keys to authenticate systems where SSH2 only uses host keys SSH2 is a complete rewrite of the protocol and does not use the same implementation as SSH1 – they are not compatible 2. Define Non-Repudiation(4 Marks) The non-repudiation is a way to guarantee that the sender of the message can not later deny having sent the message or having furnished the signature of a message 3. Define Cryptosystem (4marks) Cryptosystem: The hardware and software that implement the cryptographic (encryption/decryption) transformations Part E) Answer any four questions (each 5 marks) 1. Draw and explain the complete steps for Kerberos algorithm 2. List the differences between Symmetric and Asymmetric Encryption A.Symmetric ciphers use a Pre-Shared-Key (PSK). The same key is used for both encrypting and decrypting 1.Primary advantage: faster than asymmetric ciphers, hard to break with large key. 2.Primary disadvantage: difficult to distribute key 3.Cannot authenticate or provide non-repudiation 4.Includes: DES (Date Encryption Standard), Triple DES, IDEA (International Data Encryption Algorithm), RC4, RC5, AES (Advanced Encryption Standard) B.Asymmetric ciphers use a public/private key-pair. Keys are mathematically linked such that what is encrypted with one is only decrypted by the other. Keys are linked so that it is computationally hard to guess the private key having the public key 1.You must keep your private key secret. Often encrypted with a pass-phrase 2.You disclose your public key to whoever wants to communicate with you 3.You can have your public key signed by a mutually trusted Certificate Authority Advantages: Better at key distribution, better scalability for large systems, can provide authentication and non-repudiation Disadvantages: Asymmetric ciphers are many times slower than symmetric ciphers Includes: RSA , Diffie Hellman, El Gamal, DSA, Knapsack, PGP 3. Define three way hand shaking with listing the complete steps for this process TCP handshaking technique to open connections: SYN-SYN-ACK 2 systems attempting to initiate a connection for communication can negotiate one connection at a time independently of each other. Description Host A sends a TCP SYNchronize packet → Host B Host B receives A's SYN Host B sends SYN → Host A Host A receives B's SYN Host A sends ACKnowledge → Host B Host B receives ACK → TCP connection is established. TCP knows the state of a connection by using the SYN and ACK Once connected, TCP hands off to the application for data transfer and communication 4.List the IP Security functions with details for every function • Key generation – 2 C both must access to shared encryption key: Diffie–Hellman algorithm to compute shared key • Cryptographic checksums – cryptographic keys to calculate checksum for data in each packet, called a Hash Message Authentication Code (HMAC) – HMAC in combination with Message Digest 5 (MD5) and HMAC in combination with Secure Hash Algorithm-1 (SHA1): • SHA1 160-bit key and MD5 128-bit key • SHA1 in USA for high-level security requirement • Mutual authentication – C authenticate e/o to establish a trust relationship – WS2003 Kerberos, digital certificates, or pre-shared key • Replay prevention – Replay even when data in packets is encrypted – IPSec prevents replay by assigning a sequence number to each packet: anti-replay services • IP packet filtering – IPSec includes its own packet filtering mechanism: prevent DoS attacks: port, @, protocolk