Exam #1 - My FIT

advertisement
Name:
FUNDEMENTALS OF INFORMATION SECURITY
EXAM I
ANSWER ALL QUESTIONS
A B C D E F G H I J
0 1 2 3 4 5 6 7 8 9
K
10
L M
11 12
N O
13 14
P Q
15 16
R S
17 18
T U V W
19 20 21 22
X
23
Y Z
24 25
1. Encrypt the string: I GET NO PRIVACY SWIMMING IN A GLASS BOWL using a Row
transposition Cipher with the key:
G
3
I
I
O L
7 6
G E
V A
M M I
G L A
L
D F
1
2
T N
C Y
I S
5
8
O P
S W
H
4
R
I
N
S
I
B
A
W
G
S
N
O
2. Expand the key NETWORK SECURITY into a 5x5 Playfair matrix:
3. Use the key matrix of question 2 to decrypt the string:
BHHWG TDWW WHTKF R5SVWY ISISN GCMGX:
4. Indicate whether the following ciphers/key exchange mechanisms are based on private (symmetric) or
public (asymmetric).
Private
Public
a) Enigma
b) AES
c) Elliptic Curve Cryptography
d) El Gamel
e) Blumb Blumb Shub
5. Different modes of operation for block encryption have different error propagation properties. If a
single bit gets changed during transmission how much of the decrypted data stream is in error if the
following modes are being used?
1 Bit 1 Byte 1 Block 1 Block+1 Byte 2 Blocks
Electronic Code Book
Cipher Block Chaining
8-bit Cipher Feedback
Output Feedback
Counter Mode
Rest of
Transmission
6. Draw a diagram illustrating how Cipher Block Chaining works:
7. AES has the following desirable properties:
TRUE
FALSE
a) Advanced Feistel design
b) It supports block and key sizes of 128, 192, and 256 bits
c) Speed and compactness on a wide range of processors
d) The same functions can be used for encryption and decryption
e) The key schedules are the same for encryption and decryption
8. Why is Cipher Block Chaining a good mode for encryption for generating a Message Authentication
Code?
9. List ways in which secret keys can be distributed to two communicating parties (without using public
key cryptography). (4 minimum)
10. What is a nonce and why is it used?
11. What are the three broad categories of applications of public-key cryptosystems?
12. Using the primes 7 & 11 (p & n) discover an asymmetric key pair:
1) Modulus n = p*n
2) Euler totient = (n) = (p-1)(q-1) =
3) Select public key e such that 1 < e < (n) and gcd((n),e) = 1
4) Find private key d such that d = e-1 mod (n),(d * e)mod (n)=1
13. The RSA algorithm has the following properties:
TRUE
a) Advanced Feistel design
b) It is infeasible to derive the private key from the public key
c) Speed and compactness on a wide range of processors
d) The same functions can be used for encryption and decryption
e) It is relatively easy to factorise the modulus ‘n’
FALSE
14. List four general categories of schemes for the distribution of public keys.
15. Authentication functions:
TRUE
FALSE
a) Hash functions do not use keys to form Message Digests
b) Hash functions can use keys to form MACs
c) MAC functions use a secret key
d) A MAC function needs to be reversible (like encryption)
e) A MADC provides a digital signature
16. Why do message exchanges that provide two way authentication always generate the digital signature
before applying encryption?
17. What are the properties a digital signature should have (in terms of verification and authentication
(list three)?
18. What is the difference between direct and arbitrated digital signature schemes?
19. What information is contained in a X.509 certificate?
20. What is a chain of certificates?
21. Why is R64 conversion useful for an email application?
22. What are the five principal services provided by PGP?
23 What are the three parameters, which uniquely identify a Security Association?
24. Give three reasons for the IPSec ESP to include a padding field.
25. When the tunnel mode ESP is used to encrypt an IP packet show, in a diagram, what f8ields are
encrypted and what new fields are added to the original packet (for IPv4 and IPv6)?
Download