Computer and Network Security
Final Exam (A), 2008
Dr. Ron Rymon
Time: 2 hours and 30 minutes, plus 30 minutes extension.
No Additional Material is Allowed
Part A. Explain briefly 6 of the following 7 terms (4 points each):
1. 3DES EDE
- Method for using DES 3 times to encrypt text using 3 keys, hence increasing the key space. It is possible to use 3DES to emulate regular DES
- EDE is Encrypt-Decrypt-Encrypt, and shows the orientation of the encryption devices. This allows using a 3DES component to emulate simple DES
2. RBAC
- Role-Based Access Control A method for controlling access where access rights are grouped and provided to users based on their roles in the organization resulting in productivity and security gains
3. Phishing
- A type of spam mail
- Which impersonates a request from a familiar business (usually a bank)
- Refers the victim to an impersonating web site in which the victim is requested to enter personal data such as usernames and password to be used by the criminals
4. PGP
- Pretty Good Privacy
- Protocol and software for secure email
- Supports authentication
- Supports confidentiality
5. Steganography
- Hiding a message within another message
- Example or how works.
6. End-to-end encryption
- Providing confidentiality for the traffic on multiple physical network links, all the way from a source to a destination and possibly through many other links As opposed to link encryption
7. CA
- Certificate Authority – an instance responsible for granting and signing certificates of lower-ranked parties using its private key (so can be decrypted using public key).
Part B. Answer 4 of the following 5 questions (9 points each):
1. Explain the frequency analysis used by the Arabs to break monoalphabetic ciphers
- Idea of different letters appearing in different frequencies
- How to compute frequencies in ciphertext and match ciphertext letters to original text letters
- Subsequent matching of letter pairs and contexts
2. Explain the Diffie-Hellman algorithm and why it is computationally secure
- Explanation of the flow and algorithm
- Uses difficulty of discrete logarithm mod p
3. What happens in DES if the key has 1 in each bit of the left half and 0 in each bit of the second half
- The round keys would all be equal
- This happens because in the creation of the round keys, the key bits of each half are manipulated (shifts, permutation, and selection) separately.
4. Explain how biometric fingerprinting works, and how it is used for authentication
- What it is: Fingerprinting is a something-you-are form of authentication, based on the fact that different people have different fingerprints
- How it works: a reader makes a copy of the fingerprint. The image is then analyzed and compared to the original fingerprint.
- How two fingerprints are compared: The comparison uses a catalog of lines/shapes that are found in a fingerprint (minutiae)
5. Illustrate and explain how a DDoS attack is mounted
- What it is: Distributed Denial of Service. A DoS is an attack on a server that is designed to shut it down by flooding it with requests/traffic .
- How it works: In distributed DoS, the hacker is using many computers that are launching the attack when received the command from the hacker .
- How the hacker gets to control the slaves: Usually, the computers that do the actual attack were taken over by the hacker in a preceding step, e.g. through a Trojan that was downloaded by unsuspecting users .
- How it is detected: A DDoS attack is usually detected only when the traffic to the victim becomes unusual or high.
- How it is mitigated: Once detected, it is usually impossible to mitigate the attack in the areas of the network that are close to the victim. Instead, traffic aimed to the victim has to be siphoned and filtered at the ISP level, as close as possible to the perimeter or sources of the attack. Filtering is usually based on the protocols and patterns of the attack vs. the normal traffic
Part C. Answer the following two questions (20 points each):
1. Illustrate the flow, and explain the purpose and functionality of each step of the DES algorithm. What are the desired features of the round function of every Feistel algorithm?
- Block structure and block size
- Iterations structure, and number of iterations
- Sub-key generation algorithm, and key size
- Iteration formula and work on half-blocks
- Round function illustration and explanation of each part
- Explanation of how confusion and diffusion are achieved
- The process is reversible for decryption using the keys in reverse order
2. Explain how a firewall works. Describe different types of firewalls, their respective advantages and disadvantages, and the architectures in which they can be configured.
- Types: packet filter, application gateway (proxy)
- Explanation of how they work
- Advantages/disadvantages of packet filter: fast, app independent, but is not aware of app limitations
- Advantages/disadvantages of application gateway: specialization of rules, but requires app specific gateways, slow
- Illustration of a DMZ configuration