SAMPLE TEST Lesson 8 1.Describe the ECB mode. What are the problems with this mode ? 2.Describe the CBC mode. 3.What is an insertion attack for a SCS ?

shoulderslyricalΤεχνίτη Νοημοσύνη και Ρομποτική

21 Νοε 2013 (πριν από 3 χρόνια και 8 μήνες)

84 εμφανίσεις




UNIVERSITY OF NEW YO
RK TIRANA

Komuna e Parisit,
Tirana, Albania

Tel.: 00355
-
(0)4
-
273056
-
8


Fax: 00355
-
(0)4
-
273059

Web Site Address
:
http://www.unyt.edu.al

Security Engineering

Spring 2010



Course

: Security Engi
neering (4

credit hours)

Instructor

:
Dr.
Marenglen Biba

Office


:
Faculty building 1
st

floor

Office Hours

: Tuesday
3
-
5

PM or by appointment

Phone


:
42273056 / ext. 112

E
-
mail


:
marenglenbiba@unyt.edu.al

Course page

:
http://www.marengl
enbiba.net/seceng
/



SAMPLE TEST


Lesson 8


1.

Describe the ECB mode. What are the problems with this mode

?

2.

Describe the CBC mode.

3.

What is an insertion attack for a SCS

?

4.

Describe the PCBC mode.

5.

Describe link
-
by
-
link encryption.

6.

Compare hardware and software encryptions.



Lesson 9


1.

Describe the redundancy of English by introducing the necessary
concepts.

2.

Define unicity distance and ideal secrecy.

3.

What is the relationship
between NP
-
completeness and
cryptography

?

4.

Sketch and describe the
general schema for the
16
-
rounds of DES.

5.

Describe some DES variants.



Lesson 10


1.

Describe a meet
-
in
-
the
-
middle attack.

2.

Describe triple encryption with two and three keys.

3.

Describe
the comb
ination

of multiple block a
lgorithms
.

4.

Describe a linear congruential generator.

5.

Describe the Geffe generator.


Lesson 11


1.

Describe a birthday attack for a one
-
way hash function. When
would this be possible

?

2.

Describe the main loop of MD5.

3.

Describe the use
of RSA for one
-
way hashing.

4.

Describe the knapsack problem and relate it to cryptography with
an example.

5.

Describe RSA
together
with encryption and decryption.


Lesson 12


1.

Describe the discrete logarithm signature s
chem
a.

2.

Describe the Diffie
-
Hellman algorit
hm.

3.

Describe the Station
-
to
-
Station Protocol

4.

Describe
Multiple
-
Key Public
-
Key Cryptography

5.

Describe how computing without revealing is possible with
cryptography.

6.

Describe the Bell
-
PaDula model together with two attack
scenarios.

7.

Describe the NRL
-
pump and
give an example of its application.



Lesson 13


1.

Describe the lattice model.

2.

Describe the two kinds
of separation of duty policy
.

3.

Describe the architecture of SWIFT.

4.

Describe the encryption operation at an ATM

? What is the role of
the terminal master key

?