Download cpopcs772FinalFall16

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
CS 772/872
Network and Systems Security
Fall 2016
2nd Exam
Time 2 & 1/2 hours
Open Book & Notes
Name:
Login:
CATALIN POP
CPOP
Each question is 10 points.
1. Assume DES is used to encrypt 64-bit data of all 0s using 64-bit key of all 0s.
Show the output of the S-Boxes after the first round and just before the
permutation step.
Since the answer is all 0s when XOR we then use S-BOX substitution S5.
0010 0010 0010 0010 0010 0010 0010 0010 0010 0010 0010 0010 0010 0010
0010 0010
EFA7 2C4D
2. Assume IDEA is used to encrypt 64-bit data of all 0s using 128-bit key of all
0s. Show the result at the end of the first round.
X1 = 0000 0000 0000 0000
X2 = 0000 0000 0000 0000
X3 = 0000 0000 0000 0000
X4 =0000 0000 0000 0000
K1 = 0000 0000 0000 0000
K2 = 0000 0000 0000 0000
K3 = 0000 0000 0000 0000
K4 = 0000 0000 0000 0000
New values:
X1 = MULT X1 with K1 = 0000 0000 0000 0000
X3 = add X2 with k2 = 0000 0000 0000 0000
X2 = add X3 with K3 = 0000 0000 0000 0000
X4 = MULT X4 with K4 = 0000 0000 0000 0000
All 0s
3. Assume AES is used to encrypt 128-bit data where all its octets are 52 in HEX
using 128-bit key of all 0s. Show the result at the end of the first round.
Hex = 52
S-box = 00
Key = 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
0000 0000 0000
1st round = 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
0000 0000 0000 0000
4. Which of the block chaining methods allows the pad to be generated in advance
of the message arrival?
OFB
5. Given a public key <3,6>.
List all possible values of d for the private key <d,6>?
1,3,5
6. Calculate 𝟑𝟔𝟓 using the binary representation of 65. Do NOT use calculator.
3
7. Consider Diffie-Hellman with p=7 and g=5.
Assume Alice picks 2 and Bob picks 3 as their random numbers.
What is the value of the shared secret between Alice & Bob Following
Diffie-Hellman message exchange?
TA = 2
TB = 6
X = 6^2 mod 7 = 1
Y = 2^3 mod 7 = 1
8. If you randomly select a number p < 100,
what is the probability that p is a prime number?
25% chance since there are 25 prime numbers out of 100
9. In Zero Knowledge Proof system using Graph Isomorphism.
Assume Alice has the following two graphs as her public key.
What is her private key?
f -> A
g -> B
h -> C
I -> D
J -> E
In assignment #5 explain why cs772 needs to access the signed certificates:
cs772, Y & C.
When CS 772 does the verify command we verify the signatures using the
senders_cert.pem
openssl smime -decrypt -out $2.sig -des3 -in $2 -recip $1_cert.pem -inkey
$1_privatekey.pem
openssl smime -CAfile ca_cert.pem -verify -in $2.sig -out $2.txt -signer
sender_cert.pem <- right there