Computer Networks Answers for Assignment No. 2 Semester 2, 2010 Problems

Similar documents
First Semester Examinations 2011/12 INTERNET PRINCIPLES

Properties of Secure Network Communication

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

Network Security. Omer Rana

Secret File Sharing Techniques using AES algorithm. C. Navya Latha Garima Agarwal Anila Kumar GVN

How To Encrypt With A 64 Bit Block Cipher

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Transport Layer Protocols

Lab 7. Answer. Figure 1

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Keywords Web Service, security, DES, cryptography.

Written examination in Computer Networks

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Cyber Security Workshop Encryption Reference Manual

Split Based Encryption in Secure File Transfer

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

Chapter 4: Computer Codes

Cryptography and Network Security

How To Understand And Understand The History Of Cryptography

RSA Encryption. Tom Davis October 10, 2003

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)

Message Authentication Codes

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Symmetric Key cryptosystem

Chapter 8. Network Security

This sequence diagram was generated with EventStudio System Designer (

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography

Thinking of a (block) cipher as a permutation (depending on the key) on strings of a certain size, we would not want such a permutation to have many

The application of prime numbers to RSA encryption

SSL A discussion of the Secure Socket Layer

Evaluation of the RC4 Algorithm for Data Encryption

A PPENDIX G S IMPLIFIED DES

Lecture 9 - Network Security TDTS (ht1)

COMP 361 Computer Communications Networks. Fall Semester Midterm Examination

10CS64: COMPUTER NETWORKS - II

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Final for ECE374 05/06/13 Solution!!

Wireless Encryption Protection

Data Networks Summer 2007 Homework #3

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Security in Distributed Systems. Network Security

Application Layer (1)

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

Network Security Technology Network Management

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Symmetric Mechanisms for Authentication in IDRP

The Advanced Encryption Standard (AES)

tcpcrypt Andrea Bittau, Dan Boneh, Mike Hamburg, Mark Handley, David Mazières, Quinn Slack Stanford, UCL

High Performance VPN Solutions Over Satellite Networks

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Authenticated encryption

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Computer Networks - CS132/EECS148 - Spring

Congestion Control Overview

Cryptography and Network Security Chapter 3

CS 758: Cryptography / Network Security

First Midterm for ECE374 03/09/12 Solution!!

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 13

CS268 Exam Solutions. 1) End-to-End (20 pts)

ELECTRONIC COMMERCE WORKED EXAMPLES

OOo Digital Signatures. Malte Timmermann Technical Architect Sun Microsystems GmbH

plc numbers Encoded values; BCD and ASCII Error detection; parity, gray code and checksums

Prefix AggregaNon. Company X and Company Y connect to the same ISP, and they are assigned the prefixes:

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Differentiated Services

Chapter 10. Network Security

Overview. SSL Cryptography Overview CHAPTER 1

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Application Layer (1)

Efficient Software Implementation of AES on 32-bit Platforms

Number Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may

CSCI 4250/6250 Fall 2015 Computer and Networks Security

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION

Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice:

A Perfect CRIME? TIME Will Tell. Tal Be ery, Web research TL

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

Midterm. Name: Andrew user id:

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

SSH Secure Shell. What is SSH?

400B.2.1 CH2827-4/90/ $1.OO IEEE

This sequence diagram was generated with EventStudio System Designer (

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

BRIEF INTRODUCTION TO CRYPTOGRAPHY. By PAGVAC. February 8, 2004

Network Authentication X Secure the Edge of the Network - Technical White Paper

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs

RSA Question 2. Bob thinks that p and q are primes but p isn t. Then, Bob thinks Φ Bob :=(p-1)(q-1) = φ(n). Is this true?

Solutions to Problem Set 1

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin.

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia

A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique

ICOM : Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

Transcription:

Computer Networks 159.334 Answers for Assignment No. 2 Semester 2, 2010 Problems Question 1 1.1 TCP opens a connection using the initial sequence number (ISN) 14534. The other party opens the connection with ISN 21763. Use a message sequence diagram to show the three TCP segments during connection establishment. Host 1 Host 2 SYN( SEQ=14534) SYN+ACK (SEQ=21763, ACK=14535) ACK (SEQ=14535, ACK=21764) 1.2 A TCP connection is using a window size of 10000 bytes and the previous acknowledgement number was 22001. It receives a segment with acknowledgement number 24001 and window size advertisement of 12000. Draw a diagram to show the situation of the window before and after. rwnd = 10000

BEFORE 22001 32000 window AFTER 24001 36000 window 1.3 A window holds bytes 2001 to 5000. The next byte to be sent is 3001. Draw a figure to show the situation of the window after the following two events. (a) An ACK segment with acknowledgement number 2500 and window size advertisement 5000 is received. (b) A segment carrying 4000 bytes is sent. 2501 7500 7000 window

Question 2 2.1 a) A P-box uses the following table for encryption. Show the box and connect the input to the output. 4 2 3 1 1 2 b) Is the P-box straight, compression or expansion? c) A 6 by 2 S-box adds the bits at the odd numbered positions (1, 3, 5, ) to get the right bit of the output and adds the bits at the even numbered positions (2, 4, 6, ) to get the left bit of the output. If the input is 110010 what is the output? If the input is 101101 what is the output? Assume the rightmost bit is bit 1. ANSWER a. Input: 1 1 0 0 1 0 output: 0 1 b. Input: 1 0 1 1 0 1 output: 0 0 2.2 Encrypt the message "THIS IS AN EXERCISE" using a shift cipher with a key of 20. Ignore the spaces between words. Decrypt the message to show how to get the original plaintext message.

Decryption of the message works as follows: Note: If you choose to number the letters of the alphabet from A = 01 to Z = 26, your answers will differ from the above. If you have done the working correctly, ie shifted 20 places, then you will receive full marks as long as you also showed the decryption process.

2.3 How secure is the RSA Algorithm? Try the following: Find d if you know that e=17 and n = 187. Show how easy it is to break the secret code if n is small. The main point in the RSA method is that n needs to be a very large number so that an intruder cannot factor it. In our example, n can be easily broken because, the intruder can find that n = 187 = 17 11. In other words, p is 17 and q is 11. Now, the intruder can calculate the value of φ = (17 1) (11 1) = 160, When the intruder knows this number and the public value of e = 17, the value of d can be found as d = 113. Thus, the secret can be broken! 2.4 Using e = 13, d = 37, and n=77 in the RSA algorithm, encrypt the message "FINE" using the values of 00 to 25 for the letters A - Z. For simplicity, do the encryption and decryption letter by letter. Note: A similar comment to the note for Q2.2 applies here also. If your numbering scheme is different from the above, your answer will be accepted if all other working is correct. 2.5 Encrypt "INTERNET" using a transposition cipher with the following key: 3 5 2 1 4 1 2 3 4 5 Question 3 Note: If you do not add the bogus/dummy characters you will not score full marks for this question. 3.1 Consider a leaky-bucket policer that polices the average rate and burst size of a packet flow. We now want to police the peak rate, p, as well. Show how the output of this leaky-bucket policer can be fed into a second leaky-bucket policer so that the two leaky buckets in series police the average rate, peak rate, and burst size. Provide the bucket

size and token generation rate of the second policer. See figure below. For the second leaky bucket, r p, b 1. Note: Some alternative answers that reverse this leaky bucket series are also acceptable. 3.2 One adaptive rate control method for broadband network management operates by requesting a source to reduce its output rate by a factor r every time that a congestion signal is received, and it increases its output rate by an additive amount b otherwise. Assuming that a source outputs at a rate of 100% at time t = 0. a) Suppose that the source receives four congestion signals and we observe that the output rate has fallen to 60%. Compute the reduction factor r in this case. b) Based on the result of a) above, if we receive a further two congestion signals and then no further congestion signals are sent from that point onwards. Compute the time required for the system to recover to its full 100% output rate if b = 5% per 10 msec. Rate is 100% at time t = 0. a) Rate after 4 signals would be 100r 4 = 60. Solving for r gives r 4 0.6 0.880112 b) After to more signals we have it as 0.4647588 = 46.5% if it now rises at the rate of 5% per 10 msec there are approximately 11 steps required to restore it to about 100% or 11 x 10msec = 110msec to reach 100% + + + + + + + +