# EXAM questions for the course TTM Information Security May Part 1

Save this PDF as:

Size: px
Start display at page:

Download "EXAM questions for the course TTM4135 - Information Security May 2013. Part 1"

## Transcription

1 EXAM questions for the course TTM Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question is given next to the question. Maximal number of points in this part of the exam is 28. Time for work on this test: ~60 minutes. TOPIC: DES and its variants 1. (5 points) How many rounds have DES, how big is the key and how big is the block? 2. (4 points) How many S-boxes have DES? 3. (7 points) Explain the Feistel Cipher Structure? 4. (7 points) Explain how meet in the middle attack works against 2DES! 5. (5 points) Explain how 3DES is designed!

2 KEY for Part 1 1. DES has 16 rounds, it has 56-bit key and the block size is 64 bits S-boxes 3. Student should mention that the Feistel Cipher Structure partitions input block into two halves which are processed through multiple rounds which perform a substitution on left data half, based on round function of right half & subkey, and then have permutation swapping halves. 4. Student should mention that encryption in 2DES is defined as C = E K2 (E K1 (P)), where K1 and K2 are 56-bit keys. Knowing one pair (P, C) the meet in the middle attack uses the fact that E K1 (P) = X = D K2 (C). So the attacker builds two tables T1 and T2 each of size 2 56 entries. T1 is built with encrypting P with all possible 2 56 keys, and T2 is built by decrypting C with all possible 2 56 keys. The intersection between these two tables will give a possible key pair (K1, K2). 5. C = E K3 (D K2 (E K1 (P)))

3 EXAM questions for the course TTM Information Security May 2013 Part 2 This part consists of 40 questions. For every question 5 alternative answers are given, of which ONLY ONE is correct. If you chose the correct answer you will earn 1.8 points, otherwise you will lose 0.45 points (i.e. the penalty is points). If you not choose any answer - then you will not get any points (i.e. the earned points are 0). Maximal number of points in this part of the exam is 72. Time for work on this test: ~120 minutes. Multiple choice answers Candidate nr USE CAPITAL LETTERS! PLEASE FILL IN AND DELIVER THIS PAGE Nr. Answer Nr. Answer

4 1. A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack is called: A. Security algorithm B. Security protocol C. Security defense D. Security mechanism E. Security service 2. The Security Requirements Triad include the following three requirements: A. Privacy, Confidentiality, Anonymity B. IPv4, IPv6, IPSec C. Secret Key, Public Key, Trusted Third Party D. Encryption, Decryption, Authentication E. Confidentiality, Integrity, Availability 3. If a cipher has the property that given limited computing resources (for example time needed for calculations is greater than age of universe), the cipher cannot be broken, then the cipher is offering a(n). A. unconditional security B. conditional security C. computational security D. ultimate security E. universal security 4. The Vigenère Cipher is. A. a product cipher B. a monoalphabetic substitution cipher C. a polyalphabetic substitution cipher D. a transposition cipher E. a rotor machine 5. The cipher design principle that makes relationship between ciphertext and key as complex as possible is called. A. confusion B. diffusion C. substitution D. permutation E. ideal cipher

5 6. The DES S-boxes map. A. 6 to 4 bits B. 4 to 4 bits C. 8 to 8 bits D. 6 to 6 bits E. 4 to 6 bits 7. There is NO finite field with. A. 7 elements B. 8 elements C. 9 elements D. 10 elements E. 11 elements 8. The size of the block in AES is: A. 64 bits B. 128 bits C. 192 bits D. 256 bits E. 128 or 192 or 256 bits 9. In the NIST competition for AES there were finalist ciphers. A. 2 B. 3 C. 4 D. 5 E The name of the cipher that was chosen to be AES is. A. Twofish B. Lucifer C. MARS D. RC6 E. Rijndael

6 11. If by E K ( ) we denote the encryption function of a block cipher with a key K, and if the mode of operation is C i = E K (P i XOR C i-1 ) then the mode of operation is. A. ECB B. CBC C. CFB D. OFB E. CTR 12. XTS-AES mode of operation is used for. A. IPSec payload encryption B. IPv6 communication C. traffic encryption D. authenticated communication E. block oriented storage devices 13. Which two criteria are used to validate that a sequence of numbers is random? A. Unpredictability and Chaoticity B. Uniform distribution and Independence C. Unpredictability and Smoothness D. Uniform distribution and Indeterminism E. One-way and Independence 14. RC4 is a A. block cipher B. stream cipher C. hash function D. authentication code E. digital signature 15. For a prime number p, the property a p = a (mod p) is known as. A. Euler s Theorem B. Miller-Rabin Theorem C. Fermat s Little Theorem D. Primality Testing Theorem E. Totient Theorem

7 16. The technique used to speed up the modulo computations is called. A. Primitive root generation B. Discrete logarithm computation C. Totient computation D. Euler s Theorem E. Chinese Remainder Theorem 17. Which public key scheme CAN NOT do the key exchange? A. RSA B. ECC C. DH D. DSS E. MQ 18. In RSA, if n has 1024 bits, then the security of the scheme is in the level of: A operations B operations C operations D operations E operations 19. The strength of Diffie-Hellman public key scheme relies on the difficulty of: A. Integer factorization B. Discrete logarithm C. Graph isomorphism D. Finding shortest vector in a lattice E. Decoding random codes 20. The strength of ElGamal public key scheme relies on the difficulty of: A. Integer factorization B. Discrete logarithm C. Graph isomorphism D. Finding shortest vector in a lattice E. Decoding random codes

8 21. The Random Oracle Paradigm is a concept connected with the following cryptographic primitive: A. block cipher B. stream cipher C. hash function D. authenticated code E. digital signature 22. Merkle-Damgård construction does not act as a Random Oracle because it suffers from: A. Linearization attack B. Chosen Ciphertext Attack C. Meet-in-the-middle attack D. Man-in-the-middle attack E. Length extension attack 23. What is HMAC? A. A message authentication scheme based on a hash function B. A message authentication scheme based on a block cipher C. A message authentication scheme based on a stream cipher D. A Hypertext MArkup Coding scheme E. A hyperelliptic cryptography scheme 24. The main purpose of using Galois Counter Mode is for: A. Hash computation B. MAC computation C. Asymmetric encryption D. Authentic encryption E. Key exchange 25. If an attacker can forge a signature for at least one message, but he/she does not have control over the message, then the attack is characterized as: A. Total break B. Universal forgery C. Selective forgery D. Existential forgery E. Masquerading forgery

9 26. The original Digital Signature Algorithm produced signatures that were long. A. 320 bits B. 256 bits C. 512 bits D. 384 bits E. 128 bits 27. The key exposure problem is related with use case scenarios where. A. we need to expose our private key B. we need to expose both our private and public key C. we need to generate an exposure commitment D. we need to announce our trusted public key E. we need to generate just short lived public/private key pairs 28. In the Key Distribution Center scenario, the KDCs share and keep permanently with users their. A. private and public keys B. master keys C. session keys D. authenticated keys E. anonymous identities 29. In CA hierarchy which action has to be performed when a user s private key is compromised? A. Generation of a new private key B. Generation of a new private/public key pair C. Certificate revocation D. User renaming E. Deletion of the user s certificate 30. The following property is NOT used for the user authentication:. A. Something the individual knows B. Something the individual possesses C. Something the individual is D. Something the individual does E. Something the individual share

10 31. The authentication that is performed when the sender and the receiver are not in communications at the same time (for example when sending s) is referred as. A. Offline authentication B. One-way authentication C. Postponed authentication D. Remote authentication E. Certificateless authentication 32. One of the best known and most widely implemented trusted third party key distribution systems is called. A. Public Key Infrastructure B. Trusted Certificate Authority C. Gate Keeper D. Kerberos E. Hercules 33. The concept that is dealing with the use of a common identity management scheme across multiple enterprises, numerous applications and support of millions of users is called. A. Public Key Infrastructure B. X.800 C. Federated Identity Management D. Kerberos E. Cloud computing 34. What is the correct ordering of layers where SSL is implemented (from lower to higher)? A. 1: IP, 2: TCP, 3: SSL or TLS B. 1: IP/IPSec, 2: SSL or TLS, 3: TCP C. 1: TCP, 2: HTTP or FTP or SMTP, 3: SSL or TLS D. 1: SSL or TLS, 2: UDP, 3: IP E. 1: TCP, 2: HTTP, 3: SSL or TLS 35. SSH stands for. A. Secure Shell B. Secure Socket Hash C. Secure Secret Hash D. Secure Socket Header E. Secure Secret Handout

11 36. A series of protocols and transmission specifications for wireless LANs (WLANs) is known as. A. X.800 B. X.500 C. NIST FIPS800 D. IEEE E. ANSI PGP key management relies on A. X.509 certificates B. Kerberos servers C. Web of trust D. OSI Reference model E. Commercial Certificate Authorities 38. Domain Keys Identified Mail (DKIM) is a specification for. A. key distribution by an system B. enhancing S/MIME C. identification of internet domains D. key management by an system E. cryptographically signing messages 39. Which three functional areas are provided by IPSec? A. Authentication, Confidentiality, and Digital Signatures B. Authentication, Confidentiality, and Key management C. Authentication, Error detection, and Error correction D. Authentication, Key generation, and Certificate exchange E. Encryption, Decryption, and Certificate validation 40. What is firewall? A. A fundamental tool for intrusion detection B. A statistical anomaly detection technique C. A password based network router D. A distributed intrusion detection system E. A choke point of control and monitoring of the network traffic

12 KEY for Part 2 1. D 2. E 3. C 4. C 5. A 6. A 7. D 8. B 9. D 10. E 11. B 12. E 13. B 14. B 15. C 16. E 25. D 26. A 27. E 28. B 29. C 30. E 31. B 32. D 33. C 34. A 35. A 36. D 37. C 38. E 39. B 40. E 17. D 18. B 19. B 20. B 21. C 22. E 23. A 24. D

1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...

### IT Networks & Security CERT Luncheon Series: Cryptography

IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI

### Lecture 9 - Network Security TDTS41-2006 (ht1)

Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA Schuba@IDA.LiU.SE Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,

### Chapter 10. Network Security

Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce

### Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

### CS 758: Cryptography / Network Security

CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: dstinson@uwaterloo.ca my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html

### CRYPTOGRAPHY AND NETWORK SECURITY

CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE SIXTH EDITION William Stallings International Edition contributions by Mohit P Tahiliani NITK Surathkal PEARSON Boston Columbus Indianapolis New

### CRYPTOG NETWORK SECURITY

CRYPTOG NETWORK SECURITY PRINCIPLES AND PRACTICES FOURTH EDITION William Stallings Prentice Hall Upper Saddle River, NJ 07458 'jkfetmhki^^rij^jibwfcmf «MMr""'-^.;

### APNIC elearning: Cryptography Basics. Contact: esec02_v1.0

APNIC elearning: Cryptography Basics Contact: training@apnic.net esec02_v1.0 Overview Cryptography Cryptographic Algorithms Encryption Symmetric-Key Algorithm Block and Stream Cipher Asymmetric Key Algorithm

### Cryptography and Network Security

PART-A Questions 1. Name the aspects to be considered of information security. 2. What is meant by deciphering? 3. What are the two different uses of public key cryptography related to key distribution?

### Stream Ciphers. Example of Stream Decryption. Example of Stream Encryption. Real Cipher Streams. Terminology. Introduction to Modern Cryptography

Introduction to Modern Cryptography Lecture 2 Symmetric Encryption: Stream & Block Ciphers Stream Ciphers Start with a secret key ( seed ) Generate a keying stream i-th bit/byte of keying stream is a function

### CRYPTOGRAPHY IN NETWORK SECURITY

ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can

### Chapter 8. Network Security

Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who

### Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Network Security Chapter 8 Cryptography Symmetric-Key Algorithms Public-Key Algorithms Digital Signatures Management of Public Keys Communication Security Authentication Protocols Email Security Web Security

### CRYPTOGRAPHY AND NETWORK SECURITY Principles and Practice

CRYPTOGRAPHY AND NETWORK SECURITY Principles and Practice THIRD EDITION William Stallings Prentice Hall Pearson Education International CONTENTS CHAPTER 1 OVERVIEW 1 1.1 1.2 1.3 1.4 1.5 1.6 PART ONE CHAPTER

### Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the

### Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead

### 7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

### 159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication

### 12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

### CPS 590.5 Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang xwy@cs.duke.edu

CPS 590.5 Computer Security Lecture 9: Introduction to Network Security Xiaowei Yang xwy@cs.duke.edu Previous lectures Worm Fast worm design Today Network security Cryptography building blocks Existing

### 7! Cryptographic Techniques! A Brief Introduction

7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures

### Network Security Fundamentals

APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security IPv6

### CS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks - Security; 30 th - 31 st Oct 2012 Instructor: Sridhar Iyer IIT Bombay Network security Security Plan (RFC 2196) Identify assets Determine threats Perform risk analysis Implement

### : Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Subject Code Department Semester : Network Security : XCS593 : MSc SE : Nineth Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Part A (2 marks) 1. What are the various layers of an OSI reference

### APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)

APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist nurul@apnic.net Specialties: Routing &

### Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Goals v understand principles of network security: cryptography and its many uses beyond

### Cornerstones of Security

Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

### Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection

### VALLIAMMAI ENGINEERING COLLEGE

VALLIAMMAI ENGINEERING COLLEGE (A member of SRM Institution) SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year and Semester : I / II Section : 1 Subject Code : NE7202

### Overview of CSS SSL. SSL Cryptography Overview CHAPTER

CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers

### Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles

### Applied Cryptology. Ed Crowley

Applied Cryptology Ed Crowley 1 Basics Topics Basic Services and Operations Symmetric Cryptography Encryption and Symmetric Algorithms Asymmetric Cryptography Authentication, Nonrepudiation, and Asymmetric

### Computer Security: Principles and Practice

Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography

NETWORK ADMINISTRATION AND SECURITY Unit I (NAS) (W- 10) Q. 1) What is Security Attack? Explain general categories of attack with examples. 7 Q. 2) List and define the five security services. 5 Q. 3) Define

### Cryptography and network security CNET4523

1. Name of Course 2. Course Code 3. Name(s) of academic staff 4. Rationale for the inclusion of the course/module in the programme Cryptography and network security CNET4523 Major The Great use of local

### IT Information Systems Security

- Information Systems Security (Compulsory) INTRODUCTION This is one of the compulsory courses designed for Semester 5 of the Bachelor of Information Technology Degree program. This course on Information

### WEB Security: Secure Socket Layer

WEB Security: Secure Socket Layer Cunsheng Ding HKUST, Hong Kong, CHINA C. Ding - COMP581 - L22 1 Outline of this Lecture Brief Information on SSL and TLS Secure Socket Layer (SSL) Transport Layer Security

### Overview. SSL Cryptography Overview CHAPTER 1

CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure

### Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Secret Key Cryptography Modes of operation Stream

### Chapter 17. Transport-Level Security

Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

### Shift Cipher. Ahmet Burak Can Hacettepe University. Substitution Cipher. Enigma Machine. How perfect secrecy can be satisfied?

One Time Pad, Block Ciphers, Encryption Modes Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr Basic Ciphers Shift Cipher Brute-force attack can easily break Substitution Cipher Frequency analysis

### CS 356 Lecture 27 Internet Security Protocols. Spring 2013

CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

### CRYPTOGRAPHIC PRIMITIVES AN INTRODUCTION TO THE THEORY AND PRACTICE BEHIND MODERN CRYPTOGRAPHY

CRYPTOGRAPHIC PRIMITIVES AN INTRODUCTION TO THE THEORY AND PRACTICE BEHIND MODERN CRYPTOGRAPHY Robert Sosinski Founder & Engineering Fellow Known as "America's Cryptologic Wing", is the only Air Force

### Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

### Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 3 Symmetric Cryptography General Description Modes of ion Data ion Standard (DES)

### First Semester Examinations 2011/12 INTERNET PRINCIPLES

PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES

### Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Friends and Enemies Security Outline Encryption lgorithms Protocols Message Integrity Protocols Key Distribution Firewalls Figure 7.1 goes here ob, lice want to communicate securely Trudy, the intruder

### ICTTEN8195B Evaluate and apply network security

ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated

### Network Security. Outline of the Tutorial

Network Security Dr. Indranil Sen Gupta Head, School of Information Technology Professor, Computer Science & Engg. Indian Institute of Technology Kharagpur 1 Outline of the Tutorial Security attacks and

### Communication Security for Applications

Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer

### CSE/EE 461 Lecture 23

CSE/EE 461 Lecture 23 Network Security David Wetherall djw@cs.washington.edu Last Time Naming Application Presentation How do we name hosts etc.? Session Transport Network Domain Name System (DNS) Data

### CS3235 - Computer Security Third topic: Crypto Support Sys

Systems used with cryptography CS3235 - Computer Security Third topic: Crypto Support Systems National University of Singapore School of Computing (Some slides drawn from Lawrie Brown s, with permission)

### CRYPTOGRAPHIC ALGORITHMS (AES, RSA)

CALIFORNIA STATE POLYTECHNIC UNIVERSITY, POMONA CRYPTOGRAPHIC ALGORITHMS (AES, RSA) A PAPER SUBMITTED TO PROFESSOR GILBERT S. YOUNG IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE COURSE CS530 : ADVANCED

### Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

### Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Department of Computer & Information Sciences CSCI-445: Computer and Network Security Syllabus Course Description This course provides detailed, in depth overview of pressing network security problems

### 3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security

### General about the course. Course assignment. Outline. T Cryptosystems. Summary and review of lectures

General about the course T 110.5211 Cryptosystems Summary and review of lectures 4.12.2008 This is the fifth time the course was arranged We need a course covering practical cryptographic topics Security

### Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic

### Crypto Basics. Ed Crowley. Spring 2010

Crypto Basics Ed Crowley Spring 2010 Kerckhoff s Principle Symmetric Crypto Overview Key management problem Attributes Modes Symmetric Key Algorithms DES Attributes Modes 3DES AES Other Symmetric Ciphers

### Public Key Cryptography Overview

Ch.20 Public-Key Cryptography and Message Authentication I will talk about it later in this class Final: Wen (5/13) 1630-1830 HOLM 248» give you a sample exam» Mostly similar to homeworks» no electronic

### Network Security Technology Network Management

COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission

### AC76/AT76 CRYPTOGRAPHY & NETWORK SECURITY DEC 2014

Q.2a. Define Virus. What are the four phases of Viruses? In addition, list out the types of Viruses. A virus is a piece of software that can infect other programs by modifying them; the modification includes

### CS 600.443 Final Exam

CS 600.443 Final Exam Name: This exam is closed book and closed notes. You are required to do this completely on your own without any help from anybody else. Feel free to write on the back of any page

### CS419: Computer Security

CS419: Computer Security MAC, HMAC, Hash functions, DSA, SSL Vinod Ganapathy Message Authentication message authentication is concerned with: protecting the integrity of a message validating identity of

### Modes of Operation of Block Ciphers

Chapter 3 Modes of Operation of Block Ciphers A bitblock encryption function f: F n 2 Fn 2 is primarily defined on blocks of fixed length n To encrypt longer (or shorter) bit sequences the sender must

### NOORUL ISLAM COLLEGE OF ENGINEERING,KUMARACOIL. ME COMPUTER SCIENCE AND ENGG CS1629 -NETWORK SECURITY

NOORUL ISLAM COLLEGE OF ENGINEERING,KUMARACOIL. ME COMPUTER SCIENCE AND ENGG CS1629 -NETWORK SECURITY 1. What types of information might be derived from a traffic analysis attack? The following types of

### Savitribai Phule Pune University

Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter

### Network Security. Omer Rana

Network Security Omer Rana CM0255 Material from: Cryptography Components Sender Receiver Plaintext Encryption Ciphertext Decryption Plaintext Encryption algorithm: Plaintext Ciphertext Cipher: encryption

### EXAM questions for the course TTM4135 - Information Security June 2010. Part 1

EXAM questions for the course TTM4135 - Information Security June 2010 Part 1 This part consists of 6 questions all from one common topic. The number of maximal points for every correctly answered question

### Network Security Essentials:

Network Security Essentials: Applications and Standards Fifth Edition William Stallings International Editions contributions by B. R. Chandavarkar National Institute of Technology Karnataka, Surathkal

### An Introduction to Cryptography as Applied to the Smart Grid

An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric

### Computer Networks. Secure Systems

Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to

### CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and

### Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,

### lundi 1 octobre 2012 In a set of N elements, by picking at random N elements, we have with high probability a collision two elements are equal

Symmetric Crypto Pierre-Alain Fouque Birthday Paradox In a set of N elements, by picking at random N elements, we have with high probability a collision two elements are equal N=365, about 23 people are

### Overview. SSL Cryptography Overview CHAPTER 1

CHAPTER 1 Secure Sockets Layer (SSL) is an application-layer protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

### Lecture 4 Data Encryption Standard (DES)

Lecture 4 Data Encryption Standard (DES) 1 Block Ciphers Map n-bit plaintext blocks to n-bit ciphertext blocks (n = block length). For n-bit plaintext and ciphertext blocks and a fixed key, the encryption

### The Advanced Encryption Standard (AES)

The Advanced Encryption Standard (AES) All of the cryptographic algorithms we have looked at so far have some problem. The earlier ciphers can be broken with ease on modern computation systems. The DES

### Authentication requirement Authentication function MAC Hash function Security of

UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy

### ECE 428 Network Security

ECE 428 Network Security 1 Learning objectives Security requirements and tools Symmetric-key (secret key) cryptography Substitution, transposition, and product ciphers (DES) Public key cryptography: RSA

### SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,

### DRAFT Standard Statement Encryption

DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held

### Cryptography and Key Management Basics

Cryptography and Key Management Basics Erik Zenner Technical University Denmark (DTU) Institute for Mathematics e.zenner@mat.dtu.dk DTU, Oct. 23, 2007 Erik Zenner (DTU-MAT) Cryptography and Key Management

### Cryptography and Network Security Chapter 6

Cryptography and Network Security Chapter 6 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 6 Block Cipher Operation Many savages at the present day regard

### Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)

Security Protocols (bmevihim132) Dr. Levente Buttyán associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS) buttyan@hit.bme.hu, buttyan@crysys.hu Outline - architecture

### , ) I Transport Layer Security

Secure Sockets Layer (SSL, ) I Transport Layer Security _ + (TLS) Network Security Products S31213 UNCLASSIFIED Location of SSL -L Protocols TCP Ethernet IP SSL Header Encrypted SSL data= HTTP " Independent

### Security vulnerabilities in the Internet and possible solutions

Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in

### Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike

### Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures

### Network Security Part II: Standards

Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview

### CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email

CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure

### Lukasz Pater CMMS Administrator and Developer

Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign

### Security in Communication Networks

Security in Communication Networks Lehrstuhl für Informatik 4 RWTH Aachen Prof. Dr. Otto Spaniol Dr. rer. nat. Dirk Thißen Page 1 Organization Lehrstuhl für Informatik 4 Lecture Lecture takes place on

### Notes on Network Security Prof. Hemant K. Soni

Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications

### Today ENCRYPTION. Cryptography example. Basic principles of cryptography

Today ENCRYPTION The last class described a number of problems in ensuring your security and privacy when using a computer on-line. This lecture discusses one of the main technological solutions. The use

### Complying with PCI Data Security

Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring

### Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https