Slide #1-1 Introductory Computer Security CS461/ECE422 Fall 2010 Susan Hinrichs.
Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is...
-
Upload
angelina-arnold -
Category
Documents
-
view
217 -
download
1
Transcript of Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is...
![Page 1: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed 8.5x11. Both sides. Write as small as you like.](https://reader035.fdocuments.in/reader035/viewer/2022062423/5697bf951a28abf838c90ae5/html5/thumbnails/1.jpg)
Exam 1 Review
CS461/ECE422 Fall 2009
![Page 2: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed 8.5x11. Both sides. Write as small as you like.](https://reader035.fdocuments.in/reader035/viewer/2022062423/5697bf951a28abf838c90ae5/html5/thumbnails/2.jpg)
Exam guidelines
A single page of supplementary notes is allowed 8.5x11. Both sides. Write as small as you like.
Closed book No calculator Students should show work on the exam. They
can use supplementary sheets of paper if they run out of room.
Students can use scratch paper if desired.
![Page 3: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed 8.5x11. Both sides. Write as small as you like.](https://reader035.fdocuments.in/reader035/viewer/2022062423/5697bf951a28abf838c90ae5/html5/thumbnails/3.jpg)
Exam logistics
Exam will be given during normal lecture time in 1310 DCL
You will be given 50 minutes to complete the exam.
![Page 4: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed 8.5x11. Both sides. Write as small as you like.](https://reader035.fdocuments.in/reader035/viewer/2022062423/5697bf951a28abf838c90ae5/html5/thumbnails/4.jpg)
Topics
Introductory definitions Security Policies Risk Analysis Historical Cryptography Symmetric Cryptography Public or Asymmetric Cryptography Key Management Authentication Access Control
![Page 5: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed 8.5x11. Both sides. Write as small as you like.](https://reader035.fdocuments.in/reader035/viewer/2022062423/5697bf951a28abf838c90ae5/html5/thumbnails/5.jpg)
Risk Analysis
Understand Assets Vulnerabilities Threats Risk
Qualitative vs Quantitative Analysis Quantitative identifies absolute numbers for risk
probability and asset value, so can calculate risk exposure, risk leverage
![Page 6: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed 8.5x11. Both sides. Write as small as you like.](https://reader035.fdocuments.in/reader035/viewer/2022062423/5697bf951a28abf838c90ae5/html5/thumbnails/6.jpg)
Security Policy
Defines what needs to be done, not how How is mechanism or control
Organizational or natural language policies Read and identify components in an organizational
policy or standard Hierarchy of policy languages from natural
language to formal specifications to configurations
![Page 7: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed 8.5x11. Both sides. Write as small as you like.](https://reader035.fdocuments.in/reader035/viewer/2022062423/5697bf951a28abf838c90ae5/html5/thumbnails/7.jpg)
Historical Ciphers
Transposition Rail cipher/N-columnar transposition
Substitution Caesar, Vigenere, book, one-time pad, enigma
Language-based statistical attacks Character frequency analysis N-gram frequency analysis
![Page 8: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed 8.5x11. Both sides. Write as small as you like.](https://reader035.fdocuments.in/reader035/viewer/2022062423/5697bf951a28abf838c90ae5/html5/thumbnails/8.jpg)
Symmetric Encryption
Block vs stream encryption P = b0, b1, .. bn E(P,k) = E(b0, k0) || E(b1, k1) || .... If all ki's are equal and sizeof(bi) generally > 1,
E(P,k) is a block cipher DES
Feistel network Combination of p-boxes and s-boxes 56 bit key and 64 bit block
![Page 9: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed 8.5x11. Both sides. Write as small as you like.](https://reader035.fdocuments.in/reader035/viewer/2022062423/5697bf951a28abf838c90ae5/html5/thumbnails/9.jpg)
Symmetric Encryption
AES Iterative encryption Multiple key sizes: 128, 192, 256 Block size: 128 1 S box and various permutations
![Page 10: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed 8.5x11. Both sides. Write as small as you like.](https://reader035.fdocuments.in/reader035/viewer/2022062423/5697bf951a28abf838c90ae5/html5/thumbnails/10.jpg)
Block Encryption Modes
Described in text and section 7.2.2 of the Handbook of Applied Cryptography http://www.cacr.math.uwaterloo.ca/hac/about/chap7.pdf
Electronic Codebook (ECB) Cipher Block Chaining (CBC) Output Feedback (OFB) Counter Cipher Feedback (CFB)
![Page 11: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed 8.5x11. Both sides. Write as small as you like.](https://reader035.fdocuments.in/reader035/viewer/2022062423/5697bf951a28abf838c90ae5/html5/thumbnails/11.jpg)
11
Mode ?
Ek Ek
Pi-1 Pi Pi+1
Ci-1 Ci Ci+1
Ri-1
![Page 12: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed 8.5x11. Both sides. Write as small as you like.](https://reader035.fdocuments.in/reader035/viewer/2022062423/5697bf951a28abf838c90ae5/html5/thumbnails/12.jpg)
12
Mode ?
init. vector m1
DES
c1
m2
DES
c2
sent sent
…
…
…
![Page 13: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed 8.5x11. Both sides. Write as small as you like.](https://reader035.fdocuments.in/reader035/viewer/2022062423/5697bf951a28abf838c90ae5/html5/thumbnails/13.jpg)
13
Mode ?
kEk(r)r
… E …
mi
ci
![Page 14: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed 8.5x11. Both sides. Write as small as you like.](https://reader035.fdocuments.in/reader035/viewer/2022062423/5697bf951a28abf838c90ae5/html5/thumbnails/14.jpg)
14
Mode ?
Ek Ek
Pi-1 Pi Pi+1
Ci-1 Ci Ci+1
Ek
Ctri-1Ctri
Ctri+1
![Page 15: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed 8.5x11. Both sides. Write as small as you like.](https://reader035.fdocuments.in/reader035/viewer/2022062423/5697bf951a28abf838c90ae5/html5/thumbnails/15.jpg)
15
Other key generation techniques
Physical randomness Linear Feedback Shift Registers Nonlinear Feedback Shift Registers
![Page 16: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed 8.5x11. Both sides. Write as small as you like.](https://reader035.fdocuments.in/reader035/viewer/2022062423/5697bf951a28abf838c90ae5/html5/thumbnails/16.jpg)
Multiple Encryptions
Double Encryption doesn't gain much Meet-in-the-middle
Both decrypt and encrypt with test key Save both and check against the other for middle values
as you check new keys
![Page 17: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed 8.5x11. Both sides. Write as small as you like.](https://reader035.fdocuments.in/reader035/viewer/2022062423/5697bf951a28abf838c90ae5/html5/thumbnails/17.jpg)
Public/Asymmetric Encryption
Two keys One key public, eases some bootstrap issues
Based on “hard problems” RSA – factoring composites of large primes Diffie Hellman – computing discrete logarithms
Know equations for RSA and DH What values are public and what are private
![Page 18: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed 8.5x11. Both sides. Write as small as you like.](https://reader035.fdocuments.in/reader035/viewer/2022062423/5697bf951a28abf838c90ae5/html5/thumbnails/18.jpg)
Cryptographic hashes
Difference from regular checksums Keyed and keyless
When is each appropriate Brute force attack
Find another message with the same hash value Birthday attack Standard algorithms
SHA, MD5, block ciphers in CBC mode HMAC to make keyless hash keyed
![Page 19: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed 8.5x11. Both sides. Write as small as you like.](https://reader035.fdocuments.in/reader035/viewer/2022062423/5697bf951a28abf838c90ae5/html5/thumbnails/19.jpg)
Key Management
Long lived vs session keys Randomness and pseudo random Basic key distribution
Trusted third party, public key Kerberos slides in deck, but hidden
Certificates Hierarchical and web of trust
Digital signatures Several reasons why it is bad to encrypt first
![Page 20: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed 8.5x11. Both sides. Write as small as you like.](https://reader035.fdocuments.in/reader035/viewer/2022062423/5697bf951a28abf838c90ae5/html5/thumbnails/20.jpg)
Key management
Key storage Key escrow
Should be integrated in to the user's crypto system, authenticated to access escrow system, time bounded message access on unescrow
ESS/Clipper example
![Page 21: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed 8.5x11. Both sides. Write as small as you like.](https://reader035.fdocuments.in/reader035/viewer/2022062423/5697bf951a28abf838c90ae5/html5/thumbnails/21.jpg)
Authentication
Establish ID What you know What you have What you are
Spent a lot of time on passwords On line vs off line attacks Salt Anderson's formula
Challenge Response Biometrics
![Page 22: Exam 1 Review CS461/ECE422 Fall 2009. Exam guidelines A single page of supplementary notes is allowed 8.5x11. Both sides. Write as small as you like.](https://reader035.fdocuments.in/reader035/viewer/2022062423/5697bf951a28abf838c90ae5/html5/thumbnails/22.jpg)
Good luck!