Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 1 (1 point) Which is not part of the CIA Triad? Confidentiality Integrity O Authentication Availability Question 2 (1 point) Backup is to achieve

image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
Question 1 (1 point) Which is not part of the CIA Triad? Confidentiality Integrity O Authentication Availability Question 2 (1 point) Backup is to achieve primarily Confidentiality Integrity Authentication Availability Question 11 polli Consider the following scenario. A file is encrypted with a symmetric key and the key is added to the header of the file. The file is then encrypted using public-key cryptography so that only the owner of the file, Bob, can open the file. What key must be used for the second encryption with public-key cryptography? Question 4 (3 points) In the scenario of Question 3, what should Bob do to read the file? Provide a concise answer. Question 5 (2 points) You want to send a message to your business partner with your digital signature. What steps do you need to undergo to create a digital signature? Be concise in your answer. Question 6 (1 point) Public-key cryptography is used to create a message authentication code (MAC) for a message. O O True False Question 7 (1 point) Which of the following mode of operation does not use chaining? OCBC OOFB O CIR Question 8 (1 point) AES uses a public-key encryption O True O False Question 9 (1 point) What is NOT a feature of AES? Each round uses substitution and transposition O A key for each round is created from the given key O The block size is 256 bits O It produces a 128-bit block Adding a round increases the strength of encryption Question 10 (1 point) Assuming an n-bit hash code, how many samples are required to find two distinct messages that produce the same hash codes with a 50% chance of success? O logn On? Ovan O On! Question 11 (1 point) ---- principle states that the security of a cryptosystem should depend only on keeping the key secret. Question 12 (1 point) Adding a message digest to a message is to achieve the __ of the message O Confidentiality O Integrity Authentication Availability Question 13 (5 points) In this question, you will encrypt a message using RSA for given parameters below. p = 3, q = 11, e = 7, M = 5 Use the Euclidean and the Extended Euclidean algorithms to show all the steps required to derive the private key, though you can easily find the private key for this case. Question 14 (5 points) Using the parameters of RSA in the question above, answer the following. a. What will be the value of the ciphertext? b. Show the process of decrypting the ciphertext. Question 15 (5 points) In this question, you will apply the Diffie-Hellman key change algorithm with the given parameters below. p = 11 and p's generator a = 2 If Alice has a public key Ya = 9, what is Alice's private key XA? Question 16 (5 points) With the same assumption used in the question above, what is the symmetric key that both Alice and Bob derive If Bob has a public key YB = 3? Question 17 (1 point) RSA derives a key pair using the discrete logarithm problem (DLP). O O True False Question 18 (1 point) In an ____________ attack, a large number of machines are used to interrupt a service or take down a system. Question 19 (1 point) What of the following involves gaining sensitive information from personal contact with an employee? O Phishing Social Engineering Drive-by-download O Zero-day vulnerability Ransomware Question 20 (1 point) Suppose that you have created a file in a Linux machine and the file has the permission of 650. What will be the value of umask? Question 21 (6 points) BASTION Inc. has changed their encryption practice from AES-128 to AES-256. Suppose that you happen to eavesdrop their network traffic and try to launch a brute-force attack with a ciphertext you have grabbed from the eavesdropping. Compared to a brute-force attack on AES-128, how many MORE attempts do you need to try to launch the same attack on AES-256? Question 22 (5 points) Consider a brute-force attack on DES which uses a key of 64 bits, out of which every 8th bit is used to check the validity of the key. Let's assume that it takes 1 nanosecond to try a single key. How much time in years and days will it roughly take to launch your attack successfully in the worst case? Question 23 (1 point) Message Authentication Code is to provide --- and of a message O Confidentiality, integrity O Confidentiality, authenticity O Integrity, authenticity Confidentiality, availability Question 24 (1 point) You typed the following commands in order. $touch file $chmod 640 file $ls -al file What will be displayed on the monitor for the permission of the file? Question 25 (1 point) The permission of an executable file is set to rws for the owner. What can you deduce from this piece of information? Question 26 (1 point) Suppose that a user runs the command, passwd, on a Linux machine. What will be the value of the effective ID given to the user while the program is running? Question 27 (1 point) A 28-byte file is encrypted with AES-128-CBC. What will be the size of the encrypted file? Question 28 (2 points) Concisely describe how botnet ransomware can use both symmetric-key cryptography and public-key cryptography. Question 29 (2 points) Concisely describe why one-time pad achieves perfect secrecy. Question 30 (1 point) SHA-512 creates a __ message digest from a _________ of input message. O fixed-length, fixed-length O varying-length, varying-length O varying-length, fixed-length fixed-length, varying-length Question 31 (0.000001 points) Find Lab3 in the Dropbox and submit your report by Feb. 16 (Sun), 11:59pm. Type Y for your answer as a confirmation

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Expert Oracle Database Architecture

Authors: Thomas Kyte, Darl Kuhn

3rd Edition

1430262990, 9781430262992

More Books

Students also viewed these Databases questions