100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Exam (elaborations) TEST BANK FOR CRYPTOGRAPHY AND NETWORK SECURITY 1ST Edition By Behrouz A. Forouzan

Rating
4.0
(1)
Sold
1
Pages
197
Grade
A+
Uploaded on
15-11-2021
Written in
2021/2022

Exam (elaborations) TEST BANK FOR CRYPTOGRAPHY AND NETWORK SECURITY 1ST Edition By Behrouz A. Forouzan (Solution Manual) CHAPTER 1 Introduction (Solution to Practice Set) Review Questions 1. The three security goals are confidentiality, integrity, and availability.

Show more Read less











Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
November 15, 2021
Number of pages
197
Written in
2021/2022
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

, CHAPTER 1
Introduction
(Solution to Practice Set)




as
Review Questions




ew
1. The three security goals are confidentiality, integrity, and availability.
‰ Confidentiality means protecting confidential information.
‰ Integrity means that changes to the information need to be done only by




c
authorized entities.


ur
‰ Availability means that information needs to be available to authorized enti-
ties.
so
2.
se ia re
‰ In a passive attack, the attacker’s goal is just to obtain information. This
means that the attack does not modify data or harm the system. Examples of
passive attacks are snooping and traffic analysis.

m
ur d v y


‰ An active attack may change the data or harm the system. Attacks that
Co re tud



threaten the integrity and availability are active attacks. Examples of active
co
attacks are modification, masquerading, replaying, repudiation, and denial of
service.
o.
s




3. We mentioned five security services: data confidentiality, data integrity, authenti-
cation, nonrepudiation, and access control.
er
sh is




‰ Data confidentiality is to protect data from disclosure attack.
Th


H



‰ Data integrity is to protect data from modification, insertion, deletion, and
replaying.
a




‰ Authentication means to identify and authenticate the party at the other end of
the line.
‰ Nonrepudiation protects against repudiation by either the sender or the
receiver of the data.
‰ Access control provides protection against unauthorized access to data.


1


https://www.coursehero.com/file/17191161/Instructor-Solution-Chap-01/

, 2


4. Eight security mechanisms were discussed in this chapter. encipherment, data
integrity, digital signature, authentication exchange, traffic padding, routing con-
trol, notarization, and access control.
‰ Encipherment provides confidentiality.
‰ The data integrity mechanism appends a short checkvalue to the data. The
checkvalue is created by a specific process from the data itself.
‰ A digital signature is a means by which the sender can electronically sign the
data and the receiver can electronically verify the signature.
‰ In authentication exchange, two entities exchange some messages to prove
their identity to each other.




as
‰ Traffic padding means inserting some bogus data into the data traffic to thwart
the adversary’s attempt to use the traffic analysis.




ew
‰ Routing control means selecting and continuously changing different avail-
able routes between the sender and the receiver to prevent the opponent from
eavesdropping on a particular route.




c
‰ Notarization means selecting a third trusted party to control the communica-
tion between two entities.

ur
‰ Access control uses methods to prove that a user has access right to the data or
so
resources owned by a system.
5.
se ia re
‰ Cryptography, a word with origin in Greek, means “secret writing.” We used
the term to refer to the science and art of transforming messages to make them
secure and immune to attacks.

m
ur d v y


‰ Steganography, a word with origin in Greek, means "covered writing." Stega-
Co re tud



nography refers to concealing the message itself by covering it with some-
co
thing else.
o.
s




Exercises
er
sh is




6.
Th


H



a. A regular mail guarantees no security services. It is the best-effort delivery ser-
vice. The mail can be lost, altered in the mail, opened by somebody other than
the intended recipient.
a




b. A regular mail with delivery confirmation can only show that the mail has been
delivered. This can only give peace of mind to the sender that the packet is not
lost. However, since there is no signature from the recipient, it does not guaran-
tee any of the security services.
c. A regular mail with delivery confirmation and the recipient signature can pro-
vide nonrepudiation service only at the mail level, not the contents level. In
other words, the recipient of the mail cannot deny that she has not received the
mail, but she can deny that the mail contained some specific information. For


https://www.coursehero.com/file/17191161/Instructor-Solution-Chap-01/

, 3


example, if Alice sends a mail with $100 cash inside to Bob via this type of
mail, Bob cannot deny that he has received the mail, but he can deny that the
mail contained some cash inside. In some cases, the sender is an authority and it
is enough that Bob accepts he has received the mail. In this case, if there is a
dispute, the court accept the testimony of the sender about the contents.
d. A certified mail is actually the same as the regular mail with delivery confirma-
tion and the recipient signature.
e. A mail can be insured. However, this is not security in the sense we are talking
in this chapter. Secured mail can only provide compensation if the mail is lost.
f. A registered mail is different from all of the previous delivery methods. A reg-




as
istered mail is carried by the post office under the tight security. This means that
the confidentiality and integrity of the mail is guaranteed. Since a registered
mail normally includes the signed receipt, the nonrepudiation is also guaran-




ew
teed. However, nonrepudiation is only at the mail level, not the content level.
The recipient of the registered mail cannot deny that the mail has been deliv-
ered, but it can deny that it contained a special message or an item of some
value.




c
ur
7.
a. This is snooping (attack to the confidentiality of stored data). Although the con-
so
tents of the test is not confidential on the day of the test, it is confidential before
the test day.
se ia re
b. This is modification (attack to the integrity of data). The value of the check is
changed (from $10 to $100).
c. This is denial of service (attack to availability). Sending so many e-mails may

m
ur d v y


crash the server and the service may be interrupted.
Co re tud


co
8.
a. This provides access control mechanism. The process is to prove that the stu-
dent has right to access the school resources.
o.
s




b. This can provide routing control. The school may be doing this to prevent a stu-
er
sh is




dent from eavesdropping on a particular route.
c. This can be authentication exchange mechanism. The professor needs to
Th


H



authenticate the student before sending the grade. The preassigned identifica-
tion is a secret between the student and the professor.
a




d. The mechanism is similar to digital signature. It can be used for two purposes.
If the signature of the customer is checked against a signature on the file, it can
provide authentication. The signature on the withdrawal document definitely is
served as the nonrepudiation. The customer cannot later denies that she has not
received the cash.
9.
a. This is steganography. The answers to the test has not been changed; they have
been only hidden.


https://www.coursehero.com/file/17191161/Instructor-Solution-Chap-01/

Reviews from verified buyers

Showing all reviews
3 year ago

3 year ago

Thanks

4.0

1 reviews

5
0
4
1
3
0
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Expert001 Chamberlain School Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
798
Member since
4 year
Number of followers
566
Documents
1190
Last sold
3 days ago
Expert001

High quality, well written Test Banks, Guides, Solution Manuals and Exams to enhance your learning potential and take your grades to new heights. Kindly leave a review and suggestions. We do take pride in our high-quality services and we are always ready to support all clients.

4.2

159 reviews

5
104
4
18
3
14
2
7
1
16

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions