ECMM462 Fundamentals of Security 2023R

Java Python ECMM462

FACULTY OF ENVIRONMENT, SCIENCE

AND ECONOMY

COMPUTER SCIENCE

Examination, May 2023

Fundamentals of Security

Question 1

Determine whether each of the following propositions is true (T) or false (F):

(a)  Computer security is the protection of the integrity, availability, and

confidentiality of information system resources.

(b)  Confidentiality is the protection of assets from unauthorized change.

(c)  Confidentiality, availability, and integrity do not influence each other and can be viewed in isolation.

(d)  A communication link is an example of an asset.

(e)  Threats are attacks carried out.

(f)  Threat agent is another term for attacker.

(g)  A countermeasure can be devised to recover from a particular type of attack.

(h)  A circumstance or event that interrupts or prevents the correct operation of system services and functions is also called deception.

(i)  Obstruction leads to usurpation.

(j)  Hardware is the most vulnerable to attack and the least susceptible to automated controls.

Note: For each answer you get 1.5 mark if it is correct, −0.5 marks if it is wrong, and 0 marks otherwise. You can never get less than 0 marks in total.

(15 marks) (Total 15 marks)

Question 2

(a)  Consider the following access control matrix:

Write a sequence of commands to change the matrix to the following:

(10 marks)

(b)  Briefly describe the three components of a security state in Bell-LaPadula.

(6 marks) (Total 16 marks)

Question 3

(a)  What are the four properties required of a symmetric cryptosystem given by the functions:

E : K × M → C

D : K × C → M

where M and C denote the sets of messages and corresponding ciphertext, and K denotes the set of keys. (8 marks)

(b)  Use the advanced version of the Rail Fence Cipher to encrypt

SECURITYISSOMUCHFUNNNNNNN

with key

14032

in two rounds.

(6 marks) (Total 14 marks)

Question 4

(a)  Use Euler’s theorem to calculate the multiplica ECMM462 Fundamentals of Security 2023R tive inverse of 8 in mod 35. (7 marks)

(b)  Briefly describe 2 possible ways to attack an RSA ciphertext and briefly explain why they are not feasible.

(8 marks) (Total 15 marks)

Question 5

(a)  Describe the concept of a Merkel structure.

• State its purpose

•  State the requirement for the compression function

•  State its guarantee for the composed function

(6 marks)

(b)  Assume  the  following  scheme  to  provide  message  authentication  using public key cryptography:

• The sender computes the hash value h(m) of the message.

•  The sender sends the message m and an encrypted version of the hash value {h(m)}pr  to the receiver.  (Here pr denotes the senders private key).

•  The receiver uses the public key of the sender to decrypt {h}pr .

• The receiver computes h(m) and compares it to h.

(i)  Describe  a possible  attack  on message integrity  assuming that  h is preimage resistant but not weak collision resistant and briefly justify why it works. (4 marks)

(ii)  Describe  a possible  attack  on message integrity  assuming that  h is preimage resistant and weak collision resistant but not strong collision resistant and briefly justify why it works.

(4 marks) (Total 14 marks)

Question 6

Assume, that a Dolev-Yao intruder has acquired the following knowledge

M = {〈a,b〉 , {d}inv(c), inv(e), {|f|}b, {g}e, {h}a }

(a)  Decide whether or not the intruder can learn the following messages and briefly explain your reasoning.

(i)  {|d|}d

(ii)  {f}a

(iii)  {|h|}b

(iv)  {g}inv(e)

(v)  {b}e

(10 marks)

(b)  Briefly answer the following questions about nonces:

(i)  What are they?

(ii)  What are they used for?

(4 marks) (Total 14 marks)

Question 7

Consider the following datasets A and B.

In addition assume a mechanism K which returns the average weight of the people in the database (and 0 if the database is empty).  For example K(A) =  161.7. Finally, assume that a person always weights between 0 and 450 lb. Answer each of the following questions and briefly justify your answer.

(a)  Are the two datasets A and B neighbouring datasets? (3 marks)

(b)  What is the sensitivity K? (4 marks)

(c)  Does K satisfy 0         

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值