Sei sulla pagina 1di 3

Kingdom of Saudi Arabia

‫المملكة العربية السعودية‬


Ministry of Education
‫وزارة التعليم‬
Umm AlQura University
‫جامعة أم القرى‬
Adham University College
‫الكلية الجامعية بأضم‬
Computer Science Department
‫قسم الحاسب اآلل‬

Summer Semester of 2018 Academic Year

Computer Security Systems Course, 6803532-3

Home-work
Last Delivery Date: Monday, 09 / 07 / 2018 – 25 / 10 / 1439 H

Question One: 2 Marks


Choose the best answer:
1.What’s the best technique that can be used to prevent a worm software from accessing to a
Network?
a) Gatekeeper function
b) Screening logic
c) Internal security controls
d) None of them

2.Which one of the following algorithms processes the data as blocks instead of streams?
a) Feistel cipher
b) Rijndael cipher
c) RC4
d) a and c

3.Preventing the analysis result of a patient from getting modified or corrupted in a Hospital system
is preserving the confidentiality.
a) True
b) False

4.It’s better to make the cipher easy to analyze.


a) True
b) False

1
Kingdom of Saudi Arabia
‫المملكة العربية السعودية‬
Ministry of Education
‫وزارة التعليم‬
Umm AlQura University
‫جامعة أم القرى‬
Adham University College
‫الكلية الجامعية بأضم‬
Computer Science Department
‫قسم الحاسب اآلل‬

Question Two: 3 Marks


Consider a Social Media website such as Facebook, in which the user can create an account, add posts, add
friends, create groups, create pages, and follow pages, etc.
a. Give examples of confidentiality, integrity, and availability requirements associated with the website.
b. In each case, indicate the degree of importance of the requirement.

Question Three: 1 Marks


Determine in each one of the following situations if the attack is Active or Passive, if Active determine which
type of Active attacks, and if Passive determine which type of passive attacks.
a. Lama has found the password of Reham’s email written on one of her school’s textbooks, since that time
Lama has been reading Reham’s new and sent mails but with no corruptions or modifications.
b. Ali has hacked a University system and prevented Nasser from reaching to his Academic Record to see his
GPA.

Question Four: 2 Marks


Consider a very simple symmetric block encryption algorithm in which 64-bits blocks of plaintext are
encrypted using a 128-bit key. Decryption equation is defined as
𝐏 = (𝐂 ⊞ −𝐊𝟏)⨁ 𝐊𝟎
where P = plaintext, K = secret key, K0 = leftmost 64 bits of K, K1 = rightmost bits of K, ⨁ = bitwise exclusive
OR, and ⊞ = is addition mod 264.
a. Show the encryption equation. That is, show the equation for C as a function of P, K0, and K1.
Explain your answer.

Question Five: 2 Marks


Consider a Stream cipher and the next byte generated by the key generator is 11000001 and the next
plaintext byte is 10000011.
-Show the encryption and decryption operations.

2
Kingdom of Saudi Arabia
‫المملكة العربية السعودية‬
Ministry of Education
‫وزارة التعليم‬
Umm AlQura University
‫جامعة أم القرى‬
Adham University College
‫الكلية الجامعية بأضم‬
Computer Science Department
‫قسم الحاسب اآلل‬

Question Six: 1 (Bonus)


With the ECB mode, if there is an error in a block of the transmitted ciphertext, only the corresponding
plaintext block is affected. However, in the CBC mode, this error propagates.
For example, an error in the transmitted C1 (Following Figure) obviously corrupts P1 and P2.

a. Are any blocks beyond P2 affected?


b. Suppose that there is a bit error in the source version of P1. Through how many ciphertext blocks is this
error propagated? What is the effect at the receiver?
c. Is it possible to perform encryptions operation in parallel on multiple blocks of plaintext in the CBC mode?
How about decryption?
d. Suppose there is an error in a block of ciphertext on transmission using CBC, with reference to the Figure
given above. What effect is produced on the recovered plaintext blocks?

Remember, “Success is 1% inspiration and 99% perspiration” 😉


If you have any questions, feel free to ask me through my email
T.Mariah Sami Ahmed Khayat
Teacher Assistant @ Adam University College
mskhayat@uqu.edu.sa

Potrebbero piacerti anche