0% found this document useful (0 votes)
80 views

CSSs Homework

This document contains a homework assignment for a computer security systems course. It includes 6 questions about topics like encryption algorithms, network security controls, and cryptographic modes of operation. Students are asked to identify types of attacks, explain encryption equations, and analyze error propagation for different block cipher modes. The questions require knowledge of confidentiality, integrity, availability and different cryptographic techniques like stream ciphers and block ciphers and their modes of operation. The homework is to be submitted by a given deadline and students are provided with the instructor's contact information for any clarifying questions.

Uploaded by

Mariah Khayat
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
80 views

CSSs Homework

This document contains a homework assignment for a computer security systems course. It includes 6 questions about topics like encryption algorithms, network security controls, and cryptographic modes of operation. Students are asked to identify types of attacks, explain encryption equations, and analyze error propagation for different block cipher modes. The questions require knowledge of confidentiality, integrity, availability and different cryptographic techniques like stream ciphers and block ciphers and their modes of operation. The homework is to be submitted by a given deadline and students are provided with the instructor's contact information for any clarifying questions.

Uploaded by

Mariah Khayat
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Kingdom of Saudi Arabia

‫المملكة العربية السعودية‬


Ministry of Education
‫وزارة التعليم‬
Umm AlQura University
‫جامعة أم القرى‬
Adham University College
‫الكلية الجامعية بأضم‬
Computer Science Department
‫قسم الحاسب اآلل‬

Summer Semester of 2018 Academic Year

Computer Security Systems Course, 6803532-3

Home-work
Last Delivery Date: Monday, 09 / 07 / 2018 – 25 / 10 / 1439 H

Question One: 2 Marks


Choose the best answer:
1.What’s the best technique that can be used to prevent a worm software from accessing to a
Network?
a) Gatekeeper function
b) Screening logic
c) Internal security controls
d) None of them

2.Which one of the following algorithms processes the data as blocks instead of streams?
a) Feistel cipher
b) Rijndael cipher
c) RC4
d) a and c

3.Preventing the analysis result of a patient from getting modified or corrupted in a Hospital system
is preserving the confidentiality.
a) True
b) False

4.It’s better to make the cipher easy to analyze.


a) True
b) False

1
Kingdom of Saudi Arabia
‫المملكة العربية السعودية‬
Ministry of Education
‫وزارة التعليم‬
Umm AlQura University
‫جامعة أم القرى‬
Adham University College
‫الكلية الجامعية بأضم‬
Computer Science Department
‫قسم الحاسب اآلل‬

Question Two: 3 Marks


Consider a Social Media website such as Facebook, in which the user can create an account, add posts, add
friends, create groups, create pages, and follow pages, etc.
a. Give examples of confidentiality, integrity, and availability requirements associated with the website.
b. In each case, indicate the degree of importance of the requirement.

Question Three: 1 Marks


Determine in each one of the following situations if the attack is Active or Passive, if Active determine which
type of Active attacks, and if Passive determine which type of passive attacks.
a. Lama has found the password of Reham’s email written on one of her school’s textbooks, since that time
Lama has been reading Reham’s new and sent mails but with no corruptions or modifications.
b. Ali has hacked a University system and prevented Nasser from reaching to his Academic Record to see his
GPA.

Question Four: 2 Marks


Consider a very simple symmetric block encryption algorithm in which 64-bits blocks of plaintext are
encrypted using a 128-bit key. Decryption equation is defined as
𝐏 = (𝐂 ⊞ −𝐊𝟏)⨁ 𝐊𝟎
where P = plaintext, K = secret key, K0 = leftmost 64 bits of K, K1 = rightmost bits of K, ⨁ = bitwise exclusive
OR, and ⊞ = is addition mod 264.
a. Show the encryption equation. That is, show the equation for C as a function of P, K0, and K1.
Explain your answer.

Question Five: 2 Marks


Consider a Stream cipher and the next byte generated by the key generator is 11000001 and the next
plaintext byte is 10000011.
-Show the encryption and decryption operations.

2
Kingdom of Saudi Arabia
‫المملكة العربية السعودية‬
Ministry of Education
‫وزارة التعليم‬
Umm AlQura University
‫جامعة أم القرى‬
Adham University College
‫الكلية الجامعية بأضم‬
Computer Science Department
‫قسم الحاسب اآلل‬

Question Six: 1 (Bonus)


With the ECB mode, if there is an error in a block of the transmitted ciphertext, only the corresponding
plaintext block is affected. However, in the CBC mode, this error propagates.
For example, an error in the transmitted C1 (Following Figure) obviously corrupts P1 and P2.

a. Are any blocks beyond P2 affected?


b. Suppose that there is a bit error in the source version of P1. Through how many ciphertext blocks is this
error propagated? What is the effect at the receiver?
c. Is it possible to perform encryptions operation in parallel on multiple blocks of plaintext in the CBC mode?
How about decryption?
d. Suppose there is an error in a block of ciphertext on transmission using CBC, with reference to the Figure
given above. What effect is produced on the recovered plaintext blocks?

Remember, “Success is 1% inspiration and 99% perspiration” 😉


If you have any questions, feel free to ask me through my email
T.Mariah Sami Ahmed Khayat
Teacher Assistant @ Adam University College
[email protected]

You might also like