ITSS4360Fall2023_HW3

docx

School

University of Texas, Dallas *

*We aren’t endorsed by this school

Course

100

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

5

Uploaded by BaronWaterKangaroo174

Report
Network and Information Security - Itss4360 Fall 23 Homework 3 (To be submitted on e-Learning before 11.59 p.m. CDT Monday 10/30/23) Student Name: ___Krish Parikh__________________________________________ 1. A solution that is now widely used in secure communications to allow two parties to secretly agree on a shared encryption is __________________ key exchange protocol. A. Diffie–Hellman B. Alan Turing C. RSA D. John McAfee 2. __________ protocol evolved from RADIUS and involves improvements such as usage of more reliable transport protocol A. Kerberos B. Extensible Authentication Protocol C. Diameter D. Password Authentication Protocol 3. As per the principle of Kerckhoffs, only ________________ makes secure design possible in Cryptography A. Complexity of algorithm B. Social engineering C. Secrecy of key D. Secrecy of algorithm 4. An example of network security schemes that uses digital signatures is _________________ B. SIMM authentication B. Port Scanning C. TLS D. Wiretapping 5. __________ is a centralized network authentication that is the default authentication method in Windows 2000 and later. A. SAML B. EAP Homework 3 Page 1 of 5
Network and Information Security - Itss4360 Fall 23 Homework 3 C. Kerberos D. PAP 6. Encryption system in which public keys which may be disseminated widely, and private keys which are known only to the owner key is known as A. Symmetric Cryptography B. Holography C. Steganography D. Asymmetric Cryptography 7. The field of cryptography and cryptanalysis together is known as A. Cryptology B. Cryptography C. Cryptomeria D. Cryptanalysis 8. Substitution Cipher (Usable for any language) has a major weakness that could be exploited by__________ A. Phishing B. Fuzzy logic C. Frequency analysis D. Whitelisting 9. The Rail Fence cipher is a form of ______________ cipher A. Substitution B. Shift C. Hill D. Transposition 10. __________is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key. A. digital signature B. keystream C. one-way hash function D. secret key Homework 3 Page 2 of 5
Network and Information Security - Itss4360 Fall 23 Homework 3 11. In the table below pick the correct column entry matching each row entry by marking “X” in the respective intersecting cell: Match up the Entries HTTPS Block Cipher Breaking of code Symmetric Stream Cipher Shift Cipher Cryptanalysis X Single key encryption X RC4 X Caesar X SSL X DES X Homework 3 Page 3 of 5
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Network and Information Security - Itss4360 Fall 23 Homework 3 12. Describe the Authentication protocols with examples. The AAA (Authentication, Authorization, Accounting) architecture protocols are used in big networks to verify users, control access to server data, and monitor network resources and info needed for billing services. Some examples include: Remote Authentication Dial-In User Service (RADIUS): a full AAA protocol used by Internet Service Providers, and mainly require username and password credentials. Diameter: evolves from RADIUS and involves many improvements such as usage of more reliable TCP/SCTP transport protocols and higher security using TLS. Kerberos: a centralized network authentication system which is the default authentication method for Windows 2000 and later. The process is much more complex than others, and uses symmetric key cryptography which requires a trusted 3 rd party and can use public key cryptography during certain phases of authentication if needed. Homework 3 Page 4 of 5
Network and Information Security - Itss4360 Fall 23 Homework 3 13. Explain how Public Key Cryptography works and how it is used. In public-key cryptography, the public key is openly shareable, while the private key must be kept a confidential. With public-key encryption, the public key handles the encryption process, while the private key focuses on decryption. Even though Diffie and Hellman couldn’t create such a system, they showed that public key cryptography is actually a possible process, and as a result they demonstrated their key exchange protocol. This is now used as a way of allowing 2 parties to confidentially agree on key encryptions. Homework 3 Page 5 of 5