22
Exam 1 Review CS461/ECE422 Fall 2009

Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed 8.5x11. Both sides. Write as small as you like

Embed Size (px)

Citation preview

Page 1: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like

Exam 1 Review

CS461/ECE422 Fall 2009

Page 2: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like

Exam guidelines

A single page of supplementary notes is allowed 8.5x11. Both sides. Write as small as you like.

Closed book No calculator Students should show work on the exam. They

can use supplementary sheets of paper if they run out of room.

Students can use scratch paper if desired.

Page 3: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like

Exam logistics

Exam will be given during normal lecture time in 1310 DCL

You will be given 50 minutes to complete the exam.

Page 4: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like

Topics

Introductory definitions Security Policies Risk Analysis Historical Cryptography Symmetric Cryptography Public or Asymmetric Cryptography Key Management Authentication Access Control

Page 5: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like

Risk Analysis

Understand Assets Vulnerabilities Threats Risk

Qualitative vs Quantitative Analysis Quantitative identifies absolute numbers for risk

probability and asset value, so can calculate risk exposure, risk leverage

Page 6: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like

Security Policy

Defines what needs to be done, not how How is mechanism or control

Organizational or natural language policies Read and identify components in an organizational

policy or standard Hierarchy of policy languages from natural

language to formal specifications to configurations

Page 7: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like

Historical Ciphers

Transposition Rail cipher/N-columnar transposition

Substitution Caesar, Vigenere, book, one-time pad, enigma

Language-based statistical attacks Character frequency analysis N-gram frequency analysis

Page 8: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like

Symmetric Encryption

Block vs stream encryption P = b0, b1, .. bn E(P,k) = E(b0, k0) || E(b1, k1) || .... If all ki's are equal and sizeof(bi) generally > 1,

E(P,k) is a block cipher DES

Feistel network Combination of p-boxes and s-boxes 56 bit key and 64 bit block

Page 9: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like

Symmetric Encryption

AES Iterative encryption Multiple key sizes: 128, 192, 256 Block size: 128 1 S box and various permutations

Page 10: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like

Block Encryption Modes

Described in text and section 7.2.2 of the Handbook of Applied Cryptography http://www.cacr.math.uwaterloo.ca/hac/about/chap7.pdf

Electronic Codebook (ECB) Cipher Block Chaining (CBC) Output Feedback (OFB) Counter Cipher Feedback (CFB)

Page 11: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like

11

Mode ?

Ek Ek

Pi-1 Pi Pi+1

Ci-1 Ci Ci+1

Ri-1

Page 12: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like

12

Mode ?

init. vector m1

DES

c1

m2

DES

c2

sent sent

Page 13: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like

13

Mode ?

kEk(r)r

… E …

mi

ci

Page 14: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like

14

Mode ?

Ek Ek

Pi-1 Pi Pi+1

Ci-1 Ci Ci+1

Ek

Ctri-1Ctri

Ctri+1

Page 15: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like

15

Other key generation techniques

Physical randomness Linear Feedback Shift Registers Nonlinear Feedback Shift Registers

Page 16: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like

Multiple Encryptions

Double Encryption doesn't gain much Meet-in-the-middle

Both decrypt and encrypt with test key Save both and check against the other for middle values

as you check new keys

Page 17: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like

Public/Asymmetric Encryption

Two keys One key public, eases some bootstrap issues

Based on “hard problems” RSA – factoring composites of large primes Diffie Hellman – computing discrete logarithms

Know equations for RSA and DH What values are public and what are private

Page 18: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like

Cryptographic hashes

Difference from regular checksums Keyed and keyless

When is each appropriate Brute force attack

Find another message with the same hash value Birthday attack Standard algorithms

SHA, MD5, block ciphers in CBC mode HMAC to make keyless hash keyed

Page 19: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like

Key Management

Long lived vs session keys Randomness and pseudo random Basic key distribution

Trusted third party, public key Kerberos slides in deck, but hidden

Certificates Hierarchical and web of trust

Digital signatures Several reasons why it is bad to encrypt first

Page 20: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like

Key management

Key storage Key escrow

Should be integrated in to the user's crypto system, authenticated to access escrow system, time bounded message access on unescrow

ESS/Clipper example

Page 21: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like

Authentication

Establish ID What you know What you have What you are

Spent a lot of time on passwords On line vs off line attacks Salt Anderson's formula

Challenge Response Biometrics

Page 22: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like

Good luck!