Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Exam (elaborations) TEST BANK FOR CRYPTOGRAPHY AND NETWORK SECURITY 1ST Edition By Behrouz A. Forouzan

Beoordeling
4.0
(1)
Verkocht
1
Pagina's
197
Cijfer
A+
Geüpload op
15-11-2021
Geschreven in
2021/2022

Exam (elaborations) TEST BANK FOR CRYPTOGRAPHY AND NETWORK SECURITY 1ST Edition By Behrouz A. Forouzan (Solution Manual) CHAPTER 1 Introduction (Solution to Practice Set) Review Questions 1. The three security goals are confidentiality, integrity, and availability.

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

, CHAPTER 1
Introduction
(Solution to Practice Set)




as
Review Questions




ew
1. The three security goals are confidentiality, integrity, and availability.
‰ Confidentiality means protecting confidential information.
‰ Integrity means that changes to the information need to be done only by




c
authorized entities.


ur
‰ Availability means that information needs to be available to authorized enti-
ties.
so
2.
se ia re
‰ In a passive attack, the attacker’s goal is just to obtain information. This
means that the attack does not modify data or harm the system. Examples of
passive attacks are snooping and traffic analysis.

m
ur d v y


‰ An active attack may change the data or harm the system. Attacks that
Co re tud



threaten the integrity and availability are active attacks. Examples of active
co
attacks are modification, masquerading, replaying, repudiation, and denial of
service.
o.
s




3. We mentioned five security services: data confidentiality, data integrity, authenti-
cation, nonrepudiation, and access control.
er
sh is




‰ Data confidentiality is to protect data from disclosure attack.
Th


H



‰ Data integrity is to protect data from modification, insertion, deletion, and
replaying.
a




‰ Authentication means to identify and authenticate the party at the other end of
the line.
‰ Nonrepudiation protects against repudiation by either the sender or the
receiver of the data.
‰ Access control provides protection against unauthorized access to data.


1


https://www.coursehero.com/file/17191161/Instructor-Solution-Chap-01/

, 2


4. Eight security mechanisms were discussed in this chapter. encipherment, data
integrity, digital signature, authentication exchange, traffic padding, routing con-
trol, notarization, and access control.
‰ Encipherment provides confidentiality.
‰ The data integrity mechanism appends a short checkvalue to the data. The
checkvalue is created by a specific process from the data itself.
‰ A digital signature is a means by which the sender can electronically sign the
data and the receiver can electronically verify the signature.
‰ In authentication exchange, two entities exchange some messages to prove
their identity to each other.




as
‰ Traffic padding means inserting some bogus data into the data traffic to thwart
the adversary’s attempt to use the traffic analysis.




ew
‰ Routing control means selecting and continuously changing different avail-
able routes between the sender and the receiver to prevent the opponent from
eavesdropping on a particular route.




c
‰ Notarization means selecting a third trusted party to control the communica-
tion between two entities.

ur
‰ Access control uses methods to prove that a user has access right to the data or
so
resources owned by a system.
5.
se ia re
‰ Cryptography, a word with origin in Greek, means “secret writing.” We used
the term to refer to the science and art of transforming messages to make them
secure and immune to attacks.

m
ur d v y


‰ Steganography, a word with origin in Greek, means "covered writing." Stega-
Co re tud



nography refers to concealing the message itself by covering it with some-
co
thing else.
o.
s




Exercises
er
sh is




6.
Th


H



a. A regular mail guarantees no security services. It is the best-effort delivery ser-
vice. The mail can be lost, altered in the mail, opened by somebody other than
the intended recipient.
a




b. A regular mail with delivery confirmation can only show that the mail has been
delivered. This can only give peace of mind to the sender that the packet is not
lost. However, since there is no signature from the recipient, it does not guaran-
tee any of the security services.
c. A regular mail with delivery confirmation and the recipient signature can pro-
vide nonrepudiation service only at the mail level, not the contents level. In
other words, the recipient of the mail cannot deny that she has not received the
mail, but she can deny that the mail contained some specific information. For


https://www.coursehero.com/file/17191161/Instructor-Solution-Chap-01/

, 3


example, if Alice sends a mail with $100 cash inside to Bob via this type of
mail, Bob cannot deny that he has received the mail, but he can deny that the
mail contained some cash inside. In some cases, the sender is an authority and it
is enough that Bob accepts he has received the mail. In this case, if there is a
dispute, the court accept the testimony of the sender about the contents.
d. A certified mail is actually the same as the regular mail with delivery confirma-
tion and the recipient signature.
e. A mail can be insured. However, this is not security in the sense we are talking
in this chapter. Secured mail can only provide compensation if the mail is lost.
f. A registered mail is different from all of the previous delivery methods. A reg-




as
istered mail is carried by the post office under the tight security. This means that
the confidentiality and integrity of the mail is guaranteed. Since a registered
mail normally includes the signed receipt, the nonrepudiation is also guaran-




ew
teed. However, nonrepudiation is only at the mail level, not the content level.
The recipient of the registered mail cannot deny that the mail has been deliv-
ered, but it can deny that it contained a special message or an item of some
value.




c
ur
7.
a. This is snooping (attack to the confidentiality of stored data). Although the con-
so
tents of the test is not confidential on the day of the test, it is confidential before
the test day.
se ia re
b. This is modification (attack to the integrity of data). The value of the check is
changed (from $10 to $100).
c. This is denial of service (attack to availability). Sending so many e-mails may

m
ur d v y


crash the server and the service may be interrupted.
Co re tud


co
8.
a. This provides access control mechanism. The process is to prove that the stu-
dent has right to access the school resources.
o.
s




b. This can provide routing control. The school may be doing this to prevent a stu-
er
sh is




dent from eavesdropping on a particular route.
c. This can be authentication exchange mechanism. The professor needs to
Th


H



authenticate the student before sending the grade. The preassigned identifica-
tion is a secret between the student and the professor.
a




d. The mechanism is similar to digital signature. It can be used for two purposes.
If the signature of the customer is checked against a signature on the file, it can
provide authentication. The signature on the withdrawal document definitely is
served as the nonrepudiation. The customer cannot later denies that she has not
received the cash.
9.
a. This is steganography. The answers to the test has not been changed; they have
been only hidden.


https://www.coursehero.com/file/17191161/Instructor-Solution-Chap-01/

Gekoppeld boek

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
15 november 2021
Aantal pagina's
197
Geschreven in
2021/2022
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$14.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Beoordelingen van geverifieerde kopers

Alle reviews worden weergegeven
3 jaar geleden

3 jaar geleden

Thanks

4.0

1 beoordelingen

5
0
4
1
3
0
2
0
1
0
Betrouwbare reviews op Stuvia

Alle beoordelingen zijn geschreven door echte Stuvia-gebruikers na geverifieerde aankopen.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Expert001 Chamberlain School Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
819
Lid sinds
4 jaar
Aantal volgers
566
Documenten
1165
Laatst verkocht
1 maand geleden
Expert001

High quality, well written Test Banks, Guides, Solution Manuals and Exams to enhance your learning potential and take your grades to new heights. Kindly leave a review and suggestions. We do take pride in our high-quality services and we are always ready to support all clients.

4.1

162 beoordelingen

5
105
4
18
3
14
2
8
1
17

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen