Professional Documents
Culture Documents
and decryption.
T F 2. Asymmetric encryption can be used for confidentiality but not for
authentication.
decryption algorithm.
symmetric encryption.
T F 7. Much of the theory of public-‐key cryptosystems is based on
number theory.
ciphertext.
T F` 10. If the authenticator is encrypted with the sender's private key, it
T F 11. A trap-‐door one-‐way function is easy to calculate in one direction
and infeasible to calculate in the other direction unless certain
attack.
T F 14. The defense against the brute-‐force approach for RSA is to use a
T F 15. Timing attacks are ciphertext attacks that are only applicable to
RSA.
T F 2. A good hash function has the property that the results of applying
the function to a large set of inputs will produce outputs that are
T F 3. Limited characteristics make it impossible for hash functions to be
T F 4. Hash functions can be used for intrusion and virus detections.
algorithm.
T F 7. It is possible to use a hash function but no encryption for message
authentication.
file.
T F 10. A weak hash function is sufficient to protect against an attack in
which one party generates a message for another party to sign.
T F 11. The way to measure the resistance of a hash algorithm to
cryptanalysis is to compare its strength to the effort required for a
brute-‐force attack.
T F 12. It can be shown that some form of birthday attack will succeed
against any hash scheme involving the use of cipher block
hash code is small enough or that a larger hash code can be
T F 13. The most widely used hash function has been the Whirlpool.
T F 14. Big-‐endian format is the most significant byte of a word in the
T F 15. The SHA-‐512 algorithm has the property that every bit of the hash
T
F
1.
Message
authentication
is
a
mechanism
or
service
used
to
verify
T F 2. The order in which the frame check sequence and encryption
T F 3. The MAC does not provide a digital signature because both sender
T F 4. A recipient in possession of the secret key cannot generate an
T F 5. One means of forming a MAC is to combine a cryptographic hash
T F 8. The security of any MAC function based on an embedded hash
function depends in some way on the cryptographic strength of
authentication.
T F 10. If the calculated frame check sequence is equal to the incoming
T
F
13.
An
important
characteristic
of
the
MAC
algorithm
is
that
it
needs
to
be
reversible.
attacks on MAC algorithms seek to exploit some property of the
search.
T F 15. To attack MD5, the attacker can choose any set of messages and
work on these offline on a dedicated computing facility to find a
collision.
MULTIPLE CHOICE
4. Plaintext
is
recovered
from
the
ciphertext
using
the
paired
key
and
a
_____________
.
B. asymmetric encryption
C. RSA
D. DES
C. substitution D. symmetry
7. __________
are
two
related
keys,
a
public
key
and
a
private
key
that
are
used
to
perform
complementary
operations,
such
as
encryption
and
decryption
or
signature
generation
and
signature
verification.
MULTIPLE CHOICE
1. The
principal
object
of
a
hash
function
is
__________
.
A.
data
integrity
B.
compression
C.
collision
resistance
D.
mapping
messages
2. A
___________
accepts
a
variable
length
block
of
data
as
input
and
produces
a
fixed
size
hash
value
h
=
H(M).
A.
hash
resistance
B.
hash
value
C.
hash
function
D.
hash
code
3. The
Secure
Hash
Algorithm
design
closely
models,
and
is
based
on,
the
hash
function
__________
.
A.
MD5
B.
FIPS
180
C.
RFC
4634
D.
MD4
4. A
___________
is
an
algorithm
for
which
it
is
computationally
infeasible
to
find
either
(a)
a
data
object
that
maps
to
a
pre-‐specified
hash
result
or
(b)
two
data
objects
that
map
to
the
same
hash
result.
A.
cryptographic
hash
function
B.
strong
collision
resistance
C.
one-‐way
hash
function
D.
compression
function
5. The
cryptographic
hash
function
requirement
that
guarantees
that
it
is
impossible
to
find
an
alternative
message
with
the
same
hash
value
as
a
given
message
and
prevents
forgery
when
an
encrypted
hash
code
is
used
is
the
___________
.
A.
collision
resistant
B.
pseudorandomness
C.
preimage
resistant
D.
second
preimage
resistant
6. __________
is
a
mechanism
or
service
used
to
verify
the
integrity
of
a
message.
A.
Message
authentication
B.
Data
compression
C.
Data
mapping
D.
Message
digest
7. Message
authentication
is
achieved
using
a
__________
.
A.
DES
B.
MDF
C.
SHA
D.
MAC
8. __________
are
measures
of
the
number
of
potential
collisions
for
a
given
hash
value.
A.
MACs
B.
Primitives
C.
Hash
codes
D.
Preimages
9. A
hash
function
that
satisfies
the
properties
of
variable
input
size,
fixed
output
size,
efficiency,
preimage
resistant
and
second
preimage
resistant
is
referred
to
as
a
__________.
A.
strong
hash
function
B.
collision
resistant
function
C.
weak
hash
function
D.
preimage
resistant
function
10. The
effort
required
for
a
collision
resistant
attack
is
explained
by
a
mathematical
result
referred
to
as
the
___________
.
A.
Whirlpool
B.
birthday
paradox
C.
hash
value
D.
message
authentication
code
11. An
ideal
hash
algorithm
will
require
a
cryptanalytic
effort
__________
the
brute-‐force
effort.
A.
less
than
or
equal
to
B.
greater
than
or
equal
to
C.
less
than
D.
greater
than
12. The
Secure
Hash
Algorithm
was
developed
by
the
___________
.
A.
ITIL
B.
IEEE
C.
ISO
D.
NIST
13. SHA-‐1
produces
a
hash
value
of
__________
bits.
A.
224
B.
160
C.
384
D.
256
14. "Given
a
hash
function
H,
with
n
possible
outputs
and
a
specific
value
H(x),
if
H
is
applied
to
k
random
inputs,
what
must
be
the
value
of
k
so
that
the
probability
that
at
least
one
input
y
satisfies
H(y)
=
H(x)
is
0.5?"
is
a
reference
to
the
__________
.
A.
authentication
code
B.
collision
resistant
C.
big
endian
D.
birthday
attack
15. Three
new
versions
of
SHA
with
hash
value
lengths
of
256,
384,
and
512
bits
are
collectively
known
as
__________
.
A.
SHA-‐3
B.
SHA-‐1
C.
SHA-‐2
D.
SHA-‐0
MULTIPLE CHOICE
1. _________
encryption
provides
authentication
among
those
who
share
the
secret
key.
A.
Message
B.
Asymmetric
C.
Symmetric
D.
Authenticated
2. The
__________
mode
of
operation
is
designed
to
be
parallelizable
so
that
it
can
provide
high
throughput
with
low
cost
and
low
latency.
A.
DAA
B.
CCM
C.
GCM
D.
CTR
3. Insertion
of
messages
into
the
network
from
a
fraudulent
source
is
a
__________
attack.
A.
content
modification
B.
masquerade
C.
source
repudiation
D.
sequence
modification
4. Confidentiality
can
be
provided
by
performing
message
encryption
__________
the
MAC
algorithm.
A.
before
B.
before
or
after
C.
after
D.
during
5. A
__________
is
an
algorithm
that
requires
the
use
of
a
secret
key.
A.
DAA
B.
SHA
C.
GCM
D.
MAC
6. "Release
of
message
contents
to
any
person
or
process
not
possessing
the
appropriate
cryptographic
key"
is
a
__________
attack.
A.
content
modification
B.
source
repudiation
C.
disclosure
D.
sequence
modification
7. With
_________
authentication
an
opponent
would
have
difficulty
generating
ciphertext
that
when
decrypted
would
have
valid
error
control
bits.
A.
checksum
B.
CMAC
C.
cipher
block
chaining
D.
internal
error
control
8. The
MAC
function
is
a
__________
function.
A.
one-‐to-‐many
B.
many-‐to-‐one
C.
one-‐to-‐one
D.
one-‐to-‐two
9. The
appeal
of
__________
is
that
its
designers
have
been
able
to
prove
an
exact
relationship
between
the
strength
of
the
embedded
hash
function
and
the
strength
of
this
form
of
authentication.
A.
MAC
B.
HMAC
C.
GMAC
D.
CMAC
10. The
_________
attack
is
when
the
attacker
is
looking
for
two
messages
M
and
M1
that
produce
the
same
hash:
H(M)
=
H(M1)
A.
birthday
B.
chaining
C.
MAC
D.
hash
11. Two
MACs
that
are
based
on
the
use
of
a
block
cipher
mode
of
operation
are
Data
Authentication
Algorithm
and
__________
.
A.
GMAC
B.
DMAC
C.
TMAC
D.
CMAC
12. The
key
algorithmic
ingredients
of
_________
are
the
AES
encryption
algorithm,
the
CTR
mode
of
operation,
and
the
CMAC
authentication
algorithm.
A.
DAA
B.
GCM
C.
CCM
D.
CMA
13. The
GCM
mode
makes
use
of
two
functions:
__________,
which
is
a
keyed
hash
function,
and
GCTR.
A.
CTR
B.
HMAC
C.
GHASH
D.
CCM
14. The
essential
elements
of
any
pseudorandom
number
generator
are
a
__________
and
a
deterministic
algorithm
for
generating
a
stream
of
pseudorandom
bits.
A.
secret
key
B.
session
key
C.
seed
value
D.
stream
encryption
function
15. The
approach
taken
by
the
Transport
Layer
Security
protocol
and
the
Wireless
Transport
Layer
Security
Protocol
involve
invoking
HMAC
_________
for
each
block
of
output
wi.
A.
zero
times
B.
twice
C.
three
times
D.
once
SHORT ANSWER
1.
__________
encryption
is
a
form
of
cryptosystem
in
which
encryption
and
decryption
are
performed
using
a
public
key
and
a
private
key.
2. A
__________
is
when
two
sides
cooperate
to
exchange
a
session
key.
3. Asymmetric
encryption
transforms
plaintext
into
__________
using
one
of
two
keys
and
an
encryption
algorithm.
4. The
difficulty
of
attacking
__________
is
based
on
the
difficulty
of
finding
the
prime
factors
of
a
composite
number.
5. Public-‐key
cryptography
is
asymmetric,
involving
the
use
of
two
separate
keys,
in
contrast
to
___________
encryption,
which
uses
only
one
key.
6. A
__________
is
a
digital
document
issued
and
digitally
signed
by
the
private
key
of
a
Certification
Authority
that
binds
the
name
of
a
subscriber
to
a
public
key.
7. The
__________
is
a
set
of
policies,
processes,
server
platforms,
software
and
workstations
used
for
the
purpose
of
administering
certificates
and
public-‐private
key
pairs,
including
the
ability
to
issue,
maintain,
and
revoke
public
key
certificates.
8. The
scrambled
message
produced
as
output
is
the
__________
.
It
depends
on
the
plaintext
and
the
key.
9. A
__________
is
one
that
maps
a
domain
into
a
range
such
that
every
function
value
has
a
unique
inverse,
with
the
condition
that
the
calculation
of
the
function
is
easy,
whereas
the
calculation
of
the
inverse
is
infeasible.
10."The
sender
‘signs’
a
message
with
its
private
key.
Signing
is
achieved
by
a
cryptographic
algorithm
applied
to
the
message
or
to
a
small
block
of
data
that
is
a
function
of
the
message,"
is
a
description
of
a
___________
.
11. The
__________
scheme
is
a
block
cipher
in
which
the
plaintext
and
ciphertext
are
integers
between
0
and
n
-‐
1
for
some
n.
12. A
single
algorithm
that
will
calculate
the
greatest
common
divisor
(gcd)
of
two
integers
and,
if
the
gcd
is
1,
determine
the
inverse
of
one
of
the
integers
modulo
the
other,
is
the
__________
algorithm.
13. Four
possible
approaches
to
attacking
the
RSA
algorithm
are:
brute
force,
mathematical
attacks,
chosen
ciphertext
attacks,
and
___________
.
14. A
__________
is
an
attack
in
which
the
adversary
chooses
a
number
of
ciphertexts
and
is
then
given
the
corresponding
plaintexts,
decrypted
with
the
target's
private
key.
15. To
counter
attacks
such
as
CCAs,
RSA
Security,
Inc.
recommends
modifying
the
plaintext
using
a
procedure
known
as
___________
.
1. Asymmetric
2. key exchange
3. ciphertext
4. RSA
5. symmetric
6. Public
Key
Certificate
7. Public Key Infrastructure (PKI)
8. ciphertext
9. one-way function
10. digital signature
11. RSA
12. Euclid
13. timing
attacks
14. chosen ciphertext attack (CCA)
15. optimal asymmetric encryption padding (OAEP)
SHORT ANSWER
1. The
compression
function
used
in
secure
hash
algorithms
falls
into
one
of
two
categories:
a
function
specifically
designed
for
the
hash
function
or
an
algorithm
based
on
a
___________
.
2. A
__________
is
an
attack
based
on
weaknesses
in
a
particular
cryptographic
algorithm.
3. The
__________
resistant
guarantees
that
it
is
impossible
to
find
an
alternative
message
with
the
same
hash
value
as
a
given
message.
4. The
kind
of
hash
function
needed
for
security
applications
is
referred
to
as
a
__________
hash
function.
5. The
most
important
and
widely
used
family
of
cryptographic
hash
functions
is
the
__________
family.
6. When
a
hash
function
is
used
to
provide
message
authentication,
the
hash
function
value
is
often
referred
to
as
a
___________
.
7. Requirements
for
a
cryptographic
hash
function
include
___________
which
is
the
one-‐way
property.
8. A
hash
function
that
satisfies
the
properties
of
variable
input
size,
fixed
output
size,
efficiency,
preimage
resistant,
second
preimage
resistant
and
__________
is
referred
to
as
a
strong
hash
function.
9. The
two
categories
of
attacks
on
hash
functions
are
__________
attacks
and
cryptanalysis.
10. If
collision
resistance
is
required
the
value
_________
determines
the
strength
of
the
hash
code
against
brute-‐force
attacks.
11. The
hash
algorithm
involves
repeated
use
of
a
__________
function,
f,
that
takes
two
inputs
(an
n-‐bit
input
and
a
b-‐bit
block)
and
produces
an
n-‐bit
output.
12. SHA-‐1
is
very
similiar
in
structure
and
in
the
basic
mathematical
operations
used
to
__________
and
SHA-‐0.
13. The
evaluation
criteria
for
SHA-‐3
are
security,
___________,
and
algorithm
and
implementation
characteristics.
14. A
message
authentication
code
is
also
known
as
a
__________
hash
function.
15. The
hash
value
of
a
message
in
the
__________
application
is
encrypted
with
a
user's
private
key.
SHORT ANSWER
1. __________
assures
that
data
received
are
exactly
as
sent
and
that
the
purposed
identity
of
the
sender
is
valid.
2. Discovery
of
the
pattern
of
traffic
between
parties
is
a
__________
attack.
3. A
__________
takes
a
variable
length
message
and
a
secret
key
as
input
and
produces
an
authentication
code.
4. One
approach
to
constructing
a
MAC
is
to
use
a
symmetric
block
cipher
in
such
a
way
that
it
produces
a
__________
output
for
a
variable
length
input.
5. Any
modification
to
a
sequence
of
messages
between
parties,
including
insertion,
deletion,
and
reordering
is
a
__________
attack.
6. The
types
of
functions
that
may
be
used
to
produce
an
authenticator
are
grouped
into
three
classes:
hash
function,
message
authentication
code,
and
___________
.
7. An
alternative
authentication
technique
involves
the
use
of
a
secret
key
to
generate
a
small
fixed
size
block
of
data
known
as
a
__________
or
MAC
that
is
appended
to
the
message.
8. When
an
entire
message
is
encrypted
for
confidentiality
using
either
symmetric
or
asymmetric
encryption
the
security
of
the
scheme
generally
depends
on
the
__________
of
the
key.
9. Attacks
on
MACs
can
be
grouped
into
two
categories:
brute-‐force
attacks
and
__________
.
10. The
__________
algorithm
can
be
defined
as
using
the
cipher
block
chaining
mode
of
operation
of
DES
with
an
initialization
vector
of
zero.
11. ___________
is
a
term
used
to
describe
encryption
systems
that
simultaneously
protect
confidentiality
and
authenticity
of
communications.
12. The
HtE
approach
is
used
in
the
__________
protocol
to
protect
WiFi
networks.
13. The
__________
mode
of
operation
was
standardized
by
NIST
specifically
to
support
the
security
requirements
of
IEEE
802.1
WiFi
wireless
local
area
networks
but
can
be
used
in
any
networking
application
requiring
authenticated
encryption.
14. NIST
SP
800-‐90,
IEEE
802.11i,
and
TLS/WTLS
are
three
____________
based
on
HMAC.
15. HMAC
is
a
widely
used
standardized
_________
function
and
is
implemented
in
many
protocols
and
applications.
1. message authentication
2. traffic
analysis
3. message authentication code (MAC)
4. fixed
length
5. sequence
modification
6. message
encryption
7. cryptographic checksum
8. bit
length
9. cryptanalysis
10. data authentication
11. Authenticated encryption (AE)
12. Wired Equivalent Privacy (WEP)
13. Counter with Cipher Block Chaining-Message Authentication Code (CCM)
14. pseudorandom number generators (PRNGs)
15. MAC
1. Three
non-‐malicious
program
errors
that
result
in
application
software
vulnerabilities.
- Insecure
interaction
between
components:
e.g.
SQL
Injection,
Cross-‐site
Scripting
and
Open
Redirect.
- Risky
resource
management:
e.g.
Buffer
Overflow,
Integer
Overflow
or
wraparound.
- Porous
defenses:
e.g.
Missing
Authorization
and
Missing
Encryption
of
Sensitive
Data
2.
Give
four
methods
that
can
be
used
to
control
against
software
threat
in
software
development
process.
i. No forgery protection
viii. The
IV
is
a
part
of
the
RC4
encryption
key.
7. There
are
three
areas
of
router
security
i)
physical,
2)
operating
system
and
3)
router
hardening.
In
router
hardening
three
main
concerns
are
i)
securing
administration
control,
ii)
disable
unused
ports
and
ii)
disable
unnecessary
services.
In
order
to
secure
administration
control,
provide
FIVE
(5)
actions
that
could
be
done
to
ensure
this
is
achieved.
8. Write
a
set
of
commands
that
you
would
use
to
hardened
a
router.
You
are
required
to
create
a
username
of
admin,
hash
the
password
using
MD5,
and
force
the
router
to
access
the
internal
username
database
when
a
user
attempts
to
access
the
console
R1(config)#
username
admin
secret
Admin01pa55
R1(config)#
line
con
0
R1(config-‐line)#
login
local
9. Referring
to
the
diagram
Q2(b)
below
study
the
network
diagram
and
the
partial
configuration
stated.
i) Elaborate
what
are
the
services
that
can
enter
the
inside
network
from
the
outside
network
and
the
internet.
ii) Can
Access-‐list
101
prevent
address
spoofing
from
interface
E0?
Yes
Router
Diagram
Q2(b)
10. In
1988,
only
60,000
computers
were
connected
to
the
Internet.
On
November
2,
1988,
many
started
to
slow
down,
because
they
were
running
a
malicious
code
that
demanded
processor
time
and
that
spread
itself
to
other
computers.
The
software
was
traced
back
to
a
23
years
old
Cornell
University
graduate
student
Robert
Tappan
Morris,
Jr.
who
said
'he
wanted
to
count
how
many
machines
were
connected
to
the
Internet'
(Wikipedia.)
ii) What are the steps required in order to mitigate such attacks?
i. Containment
ii. Inoculation
iii. Quarantine
iv. Treatment