CSci 530 Midterm Exam. Fall 2012



Similar documents
Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

EXAM questions for the course TTM Information Security May Part 1

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

How To Attack A Block Cipher With A Key Key (Dk) And A Key (K) On A 2Dns) On An Ipa (Ipa) On The Ipa 2Ds (Ipb) On Pcode)

CS Final Exam

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

CSE/EE 461 Lecture 23

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

Modes of Operation of Block Ciphers

CS Computer Security Third topic: Crypto Support Sys

NETWORK ADMINISTRATION AND SECURITY

Network Security. Modes of Operation. Steven M. Bellovin February 3,

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Chapter 8. Network Security

SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK

Lecture 1: Introduction. CS 6903: Modern Cryptography Spring Nitesh Saxena Polytechnic University

The Encryption Technology of Automatic Teller Machine Networks

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Introduction to Cryptography CS 355

CS 161 Computer Security Spring 2010 Paxson/Wagner MT2

Network Security Course Specifications

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Table of Contents. Bibliografische Informationen digitalisiert durch

Client Server Registration Protocol

IT Networks & Security CERT Luncheon Series: Cryptography

Wireless Local Area. Network Security

CS549: Cryptography and Network Security

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin.

Message Authentication Codes

Network Security Part II: Standards

SeChat: An AES Encrypted Chat

EDA385 Embedded Systems Design. Advanced Course

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

CS 5490/6490: Network Security Fall 2015

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

Bit Chat: A Peer-to-Peer Instant Messenger

Demystifying Wireless for Real-World Measurement Applications

Midterm. Name: Andrew user id:

Cryptography & Network Security

Chapter 7 Transport-Level Security

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Lectures for the course: Electronic Commerce Technology (IT 60104)

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Chapter 10. Network Security

Tutorial 3. June 8, 2015

SI110 Introduction to Cyber Security Technical Foundations. Fall AY2012 Twelve Week Exam

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

Introduction to Dropbox. Jim Miller, LCITO Office Mobile

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Wireless Network Security. Pat Wilbur Wireless Networks March 30, 2007

Complying with PCI Data Security

Network Security Technology Network Management

Advanced Topics in Cryptography and Network Security

Single Sign-On Secure Authentication Password Mechanism

BSc (Hons.) Computer Science with Network Security. Examinations for 2011/ Semester 2

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

ETHERNET ENCRYPTION MODES TECHNICAL-PAPER

Waspmote Encryption Libraries. Programming guide

The Advanced Encryption Standard (AES)

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

SSL Firewalls

Cryptography and Security

Cryptography and Network Security

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

CSCI 4541/6541: NETWORK SECURITY

Secure Network Communication Based on Text-to-Image Encryption

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Functional diagram: Secure encrypted data. totally encrypted. XOR encryption. RFID token. fingerprint reader. 128 bit AES in ECB mode Security HDD

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

Lecture 9 - Network Security TDTS (ht1)

Secret File Sharing Techniques using AES algorithm. C. Navya Latha Garima Agarwal Anila Kumar GVN

AES1. Ultra-Compact Advanced Encryption Standard Core. General Description. Base Core Features. Symbol. Applications

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

SNMP SECURITY A CLOSER LOOK JEFFERY E. HAMMONDS EAST CAROLINA UNIVERSITY ICTN 6865

Overview. SSL Cryptography Overview CHAPTER 1

Course Design Document. IS403: Advanced Information Security and Trust

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Practice Questions. CS161 Computer Security, Fall 2008

Midterm 2 exam solutions. Please do not read or discuss these solutions in the exam room while others are still taking the exam.

Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Chapter 7: Network security

Introduction to Cryptography

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

GSM and UMTS security

Analyzing the Security Schemes of Various Cloud Storage Services

CSCI 362 Computer and Network Security

THE UNIVERSITY OF TRINIDAD & TOBAGO

Configure WorkGroup Bridge on the WAP131 Access Point

Cryptography and Network Security: Summary

RemotelyAnywhere. Security Considerations

OfficeConnect Internet Firewall VPN Upgrade User Guide

IPsec Details 1 / 43. IPsec Details

Lecture 9: Application of Cryptography

Transcription:

CSci 530 Midterm Exam Fall 2012 Instructions: Show all work. No electronic devices are allowed. This exam is open book, open notes. You have 100 minutes to complete the exam. Please prepare your answers on separate sheets of paper. You may write your answers on the sheet of paper with the question (front and back). If you need more space, please attach a separate sheet of paper to the page with the particular question. Do NOT extend your answer on the back of the sheet for a different question, and do NOT use the same extra sheet of paper to answer more than one question. The exam will be split apart for grading by different people, and if part of your answer for one question appears on a page given to a different grade because the sheet contains parts of the answer to more than one question, then you will NOT receive credit for that part of the answer not seen by the grader. In particular, each numbered questions must appear on separate pieces of paper so that the exam can be split for grading. Be sure to include your name and USC ID number on each page. There are 100 points in all and 3 questions. Q1 Q2 Q3 Total Score Score 1

1. (30 points) Cryptography - Cryptography - For each of the following methods for encryption or key management methods, match the method with the major characteristics discussed in class. This is not a one-to-one mapping. Some more than one method may match a characteristics, and a single method may also match more than one characteristic. We are looking for specific characteristics, for which you will receive credit. If you list what is a minor characteristic (for example, that DES by itself does not provide authentication), while you will not lose credit, you will not get credit either. You will lose a point if you associated a method with a characteristic that does not apply to the method. There are more blanks in the page below than actual correct answers, so you do not need to fill in all the blanks. 1. AES as a block cipher 2. One time pad 3. Diffie-Hellman-Key exchange 4. RSA with a 256 bit key 5. DES in cipher feedback mode (CFB) 6. DES in Electronic Code Book (ECB) mode a) Suitable as the basis for providing authentication b) Provides strong integrity c) Dense key space d) Provable / perfect confidentiality protection e) Uses an initialization vector f) Stream cipher g) Uses a single key shared by sender and receiver 2

2. (30 points) Identity Management Answer the following questions regarding identity management: a. The three factors for authentication bay be describes as something that is known, something that one has, and something about an individual. Explain how effective implementation of the second and third factors are each dependent on something that is known. (10 points) b. What is the goal of federated identity management (what advantages does it provide)? Be sure to consider both kinds of federated identity management systems: those that use a common implementation and are federated only administratively, as well as those that support federation across different implementations for authentication (such as web based federated identity management systems). (10 points) c. What are the difficult of effectively implementing federated identity management system? For any difficulties you identify, indicate which kind of system (from the kinds in part b) the difficulty applies to. (10 points) [answer on back of page] 3

3. (40 points) Design problem You have been asked to design the key management system for a smart meter system to be used by power companies (utilities) across the world. In this system, utility owned smart meters will be installed on customer s houses. These meters will communicate in a wireless mesh (meaning that one meter will send packets to another meter, which will forward the packets until they reach a concentrator on a power pole, which will then send the packets back to the utility over a fiber optic link or a long haul radio link). Important security goals for the communication are that the integrity and privacy of customer data be maintained, and that the system should be resistant to denial of service attacks. Certain functions of the meters may be controllable remotely by utilities, and there might be a capability to update the software on the meters by the utility over the network. The meters are also capable of communicating with certain devices in each customer s home. My advice to you for answering the questions that follow is to read all parts of the question up front, then think about creating a table to represent some of the answers to the different parts, and refer to your table in the answer to the questions that follow (for example, create a table with column one representing the answer to part a, with column to containing the corresponding answer to part b, and possibly other columns as well to answer the other parts of the question, then in your answer to a, simply state that the answer is in the first column of the table, etc). a. List the entities that need encryption keys in such a system. Entities may be specific devices, certain people, etc, but list the different kinds of devices and the different roles of people, etc)? (5 points) 4

b. For each of the entities your listed in part a, list the keys that need to be provided up front (the term is provisioned ) and the kind of each key (e.g. a secret key, a private key, a public key). (10 points) c. For each of the KEYS listed in part b, indicate who else shares the key. If they key is a private key, then indicate that the key is PRIVATE, and tell me who knows the corresponding public key. (10 points) d. Describe briefly the purpose of each key and indicate the reason that you chose a secret, private, or public key for that purpose, and the reason for sharing the key (or the corresponding key) or for not sharing the key (or the corresponding key) with other entities in the system). (15 points) 5