EXAM questions for the course TTM4135 - Information Security

June 2008

Part 1

This part consists of 8 questions all from one common topic. The number of maximal points for every correctly answered question is given next to the question. Maximal number of points in this part of the exam is 36. Time for work on this test: ~60 minutes.

TOPIC: Block ciphers and Data Encryption Standard

1.  (5 points) What is a block cipher?

2.  (5 points) What is a Feistel structure?

3.  (5 points) What is the purpose of diffusion in the design of block ciphers?

4.  (5 points) What is the purpose of confusion in the design of block ciphers?

5.  (4 points) How many rounds have DES, how big is the key and how big is the block?

6.  (4 points) How big can be the key in AES, how many rounds have AES for each key, and how big is the block?

7.  (4 points) Describe the Triple DES with three DES keys.

8.  (4 points) What are the two best known general attacks against block ciphers?

KEY for Part 1

TOPIC:

  1. Complete answer should mention that block cipher is an encryption/decryption scheme in which a block of plaintext is treated as a whole and used to produce a ciphertext block of equal length.
  1. Complete answer should mention that a Feistel structure is an algorithmic structure that consists of a number of identical rounds of processing. In each round a substitution is performed on one half of the data being processed, followed by a permutation that interchanges two halves. The original key is expanded so that a different key is used for each round.
  1. Complete answer should mention that in diffusion the statistical structure of the plaintext is dissipated into long-range statistics of the ciphertext. That is achieved by having each plaintext digit affect the value of many ciphertext digits, or equivalently having each ciphertext digit be affected by many plaintext digits.
  1. Complete answer should mention that the purpose of confusion is to make the relationship between statistics the ciphertext and the value of the encryption key as complex as possible, to thwart attempts to discover the key.
  1. Complete answer should say: 16 rounds, 56-bit key, 64-bit block.
  1. Complete answer should say: Key can be 128, 192 and 256 bits, the number of rounds is 10, 12 and 14 correspondingly, and the block size is 128 bits.
  1. Complete answer should mention the encryption function: C=E(K3, D(K2, E(K1, P))), where E and D are DES encryption and decryption with keys K1, K2 and K3.
  1. Complete answer should briefly describe differential and linear cryptanalysis.

EXAM questions for the course TTM4135 - Information Security

June 2008

Part 2

This part consists of 40 questions. For every question 5 alternative answers are given, of which ONLY ONE is correct. If you chose the correct answer you will earn 1.6 points, otherwise you will loose 0.4 points (i.e. the penalty is -0.4 points). If you not choose any answer - then you will not get any points (i.e. the earned points are 0). Maximal number of points in this part of the exam is 64. Time for work on this test: ~120 minutes.

  1. What is the closest meaning of the phrase “Internet security”?

a.  Rules defined in firewall systems

b.  Rules defined in IPSec

c.  Rules defined in X.500

d.  Measures to protect data during their transmission

e.  Measures to protect data during their transmission over a collection of interconnected networks

  1. According to the OSI security architecture, “Security service” is:
  2. PKI
  3. A security database server
  4. A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization.
  5. A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.
  6. PKI and defined policies
  1. What is the closest meaning of the phrase “cryptography” ?
  2. A technique of embedding one message into another
  3. A technique of military communication
  4. study of principles / methods of deciphering ciphertext without knowing key
  5. A technique of military surveillance
  6. study of encryption principles/methods
  1. In a “known plaintext attack” the attacker knows
  2. predetermined selected ciphertext
  3. one plaintext and one key
  4. predetermined selected plaintext
  5. one ciphertext and one key
  6. plaintext and ciphertext
  1. The “Playfair Cipher” uses a matrix of size
  2. 4 x 4
  3. 5 x 5
  4. 6 x 6
  5. 7 x 7
  6. 8 x 8
  1. What is a “Rotor machine”?
  2. An algorithm that rotates the Caesar alphabet.
  3. A machine that rotates the secret key with every new message.
  4. An algorithm that rotates the key of the Vernam Cipher.
  5. A machine that encodes all messages into a big rotor.
  6. A machine that consists of a set of independently rotating cylinders through which electrical pulses can flow.
  1. S-boxes in DES map
  2. 2 to 4 bits
  3. 4 to 4 bits
  4. 6 to 4 bits
  5. 4 to 6 bits
  6. 2 to 6 bits
  1. The linear cryptanalysis can find DES key knowing
  2. 247 bits of known plaintext
  3. 246 bits of known plaintext
  4. 245 bits of known plaintext
  5. 244 bits of known plaintext
  6. 243 bits of known plaintext
  1. Abelian group is
  2. every non-associative group
  3. every group with 2n elements
  4. every commutative group
  5. every a finite set of elements
  6. every matrix of order n x n
  1. gcd(1974,1068) =
  2. 4
  3. 6
  4. 8
  5. 9
  6. 1
  1. How many finalists have been chosen in the AES competition
  2. 4
  3. 5
  4. 6
  5. 10
  6. 15
  1. How many S-boxes has AES?
  2. 16
  3. 8
  4. 4
  5. 2
  6. 1
  1. What is the biggest advantage of CBC mode of operation
  2. It can encrypt in parallel different parts of the messages
  3. It does not propagate errors in the ciphertext
  4. It does not need Initialization Vector (IV)
  5. The Initialization Vector (IV) is secret – so the length of the secret key is doubled
  6. A ciphertext block depends on all blocks before it
  1. The term “keystream” is usually connected with
  2. stream ciphers
  3. block ciphers
  4. public-key ciphers
  5. key-exchange protocols
  6. key-distribution protocols
  1. In “link encryption”
  2. encryption occurs at a random location between original source and final destination
  3. need devices with shared keys only at the start and end of the multilink connection
  4. message is encrypted in the application layer at the sending host
  5. encryption occurs independently on every link
  6. end user applies encryption
  1. In OSI Reference model “end-to-end encryption” occurs in layers
  2. 3, 4, 6 and 7
  3. just 1
  4. just 2
  5. just 3 and 4
  6. just 7
  1. Which two important issues are addressed with public-key cryptography
  2. Production of big prime numbers and their multiplication
  3. Factorization of natural numbers and discrete logarithm problem
  4. Key distribution and Digital signatures
  5. Production of master and session keys
  6. Authentication and identification of users
  1. On which hard mathematical problem does RSA base its security?
  2. Factorization of big numbers
  3. Finding big prime numbers
  4. Multiplication of big prime numbers
  5. Exponentiation of big numbers
  6. Computing discrete logarithms
  1. Message authentication is not concerned with
  2. key exchange
  3. protecting the integrity of a message
  4. validating identity of originator
  5. non-repudiation of origin (dispute resolution)
  6. detecting errors in transmission of a message
  1. In computing the Message Authentication Codes both parties have to use
  2. the public key of the other party
  3. the private key of the other party
  4. two different secret keys
  5. one master and one session key
  6. a shared secret key
  1. What does it mean that a function H has “preimage resistance”?
  2. Given h, it is infeasible to find x s.t. H(x) = h
  3. Given x, it is infeasible to find y s.t. H(y) = H(x)
  4. It is infeasible to find any x, y s.t. H(y) = H(x)
  5. It can be applied to any sized message M
  6. It is easy to compute h = H(M) for any message M
  1. Secure Hash Algorithm (SHA) functions are based on the following hash function:
  2. MD2
  3. Whirlpool
  4. Haval
  5. MD4
  6. MD5
  1. How many internal iterative steps has SHA-512
  2. 32
  3. 48
  4. 56
  5. 64
  6. 80
  1. What is the block size for message processing of SHA-256?
  2. 1024 bits
  3. 512 bits
  4. 256 bits
  5. 128 bits
  6. 64 bits
  1. The hash function Whirlpool is based on components of which algorithm?
  2. DES
  3. Triple-DES
  4. AES
  5. Serpent
  6. Mars
  1. What is HMAC?
  2. Heuristic MAC function
  3. Hash function based on MAC
  4. MAC based on a hash function
  5. MAC based on the hash function Haval
  6. Hash function based on a block cipher
  1. In direct digital signatures, signing can be done
  2. only on the whole message
  3. only on the hash of the message
  4. either on the whole message or on the hash of the message
  5. on the public key of the receiver
  6. on the private key of the receiver
  1. What is the Needham-Schroeder Protocol?
  2. It is a third-party key distribution protocol
  3. It is a direct key-exchange protocol
  4. It is a protocol that prevents man-in-the middle attack
  5. It is an identity confirmation protocol
  6. It is a protocol for exchanging public keys
  1. For which type of communication is mostly used the “one-way authentication”?
  2. Web surfing
  3. Telnet
  4. FTP
  5. Direct chatting
  6. E-mail
  1. What is Kerberos?
  2. E-mail proxy server.
  3. A part of PKI.
  4. A part of X.509 public-key infrastructure.
  5. Trusted key server system from MIT.
  6. A public-key based key distribution center.
  1. What is a Kerberos realm?
  2. A set of managed nodes that share the same Kerberos database
  3. A set of public-key certificate authorities
  4. A set of key-exchange nodes
  5. A set of Kerberos security rules
  6. A set of Kerberos passwords
  1. How many versions have X.509 certificates
  2. 4
  3. 8
  4. 3
  5. 2
  6. 5
  1. PGP uses the following public key algorithms:
  2. DSS or RSA
  3. ECC or Diffie-Hellman
  4. RSA or ECC
  5. DSS or ECC
  6. DSS or Diffie-Hellman
  1. PGP key management relies on
  2. X.509 certificates
  3. Kerberos servers
  4. “Web of trust”
  5. OSI Reference model
  6. Commercial Certificate Authorities
  1. Which algorithms for digital signatures are used in S/MIME?
  2. ECC and RSA
  3. DSS and RSA
  4. ECC and DSS
  5. ECC and Diffie-Hellman
  6. RSA and Diffie-Hellman
  1. Which three functional areas are provided by IPSec?
  2. Authentication, Confidentiality, and Key management
  3. Authentication, Error detection, and Error correction
  4. Authentication, Key generation, and Certificate exchange
  5. Encryption, Decryption, and Certificate validation
  6. Authentication, Confidentiality, and Digital Signatures
  1. What is the correct ordering of layers where SSL is implemented (from lower to higher)?
  2. 1: IP/IPSec, 2: TCP, 3: SSL or TLS
  3. 1: TCP, 2: HTTP or FTP or SMTP, 3: SSL or TLS
  4. 1: IP, 2: UDP, 3: SSL or TLS
  5. 1: IP, 2: TCP, 3: SSL or TLS
  6. 1: TCP, 2: HTTP, 3: SSL or TLS
  1. In password management guidelines the password length should be bigger than:
  2. 2 letters
  3. 3 letters
  4. 4 letters
  5. 5 letters
  6. 6 letters
  1. In Information Security a “Trojan Horse” refers to a:
  2. a useful, or apparently useful, program or command procedure but with hidden (malicious) side-effects
  3. a computer virus
  4. program that sends large volumes of unwanted e-mail
  5. program which secretly takes over another networked computer then uses it to indirectly launch attacks
  6. a secret entry point into a program
  1. What is firewall?
  2. A choke point of control and monitoring of the network traffic
  3. A fundamental tool for intrusion detection
  4. A statistical anomaly detection technique
  5. A password based network router
  6. A distributed intrusion detection system

KEY for Part 2

1.  e,

2.  c,

3.  e,

4.  e,

5.  b,

6.  e,

7.  c,

8.  e,

9.  c,

10.  b,

11.  b,

12.  e,

13.  e,

14.  a,

15.  d,

16.  a,

17.  c,

18.  a,

19.  a,

20.  e,

21.  a,

22.  d,

23.  e,

24.  b,

25.  c,

26.  c,

27.  c,

28.  a,

29.  e,

30.  d,

31.  a,

32.  c,

33.  a,

34.  c,

35.  b,

36.  a,

37.  d,

38.  e,

39.  a,

40.  a