166.hw2

pdf

School

San Jose State University *

*We aren’t endorsed by this school

Course

166

Subject

Computer Science

Date

Apr 3, 2024

Type

pdf

Pages

3

Uploaded by klb2832

Report
CS 166 Information Security Homework #2 Due: 9/28/2022, Monday, midnight Except for the programming, please describe your answers in less than 10 sentences Highlight your key points for each question. Please upload your soft copy (reports, codes) on the CANVAS by the due date. Please consult with your partners in your study or project group to solve homework assignments. However, note that you must write up your report yourself without any assistance. If you turn in the exact same report and same code as your friend, both of you will receive 0 points and be considered violating academic integrity. This homework covers “Classic Encryption Techniques” and Chapters 1 and 2 of the textbook. Total 35 points 1. [5 points] (Same question as 1.5 of Chapter 1 of the textbook) Consider the following general code for allowing access to a resource: a. Explain the security flaw in this program b. Rewrite the code to avoid the flaw. Assume the IsAccessAllowed() can return the following code: NO_ERROR ERROR_ACCESS_DENIED ERROR_NOT_ENOUGH_MEMORY ERROR_RESOUCE_INSUFFICIENT
2. [8 points] (Same question as 2.5 of Chapter 2 of the textbook.) 3. [9 points] (Same question as 3.5 in “Classic Encryption Techniques” handout)
4. [8 points] A and B want to establish a secure communication channel between them. They do not care about the confidentiality of the messages being transmitted, but they do want to ensure the integrity and authenticity of the messages. Answer the following questions by drawing diagrams that show the procedures of sending and receiving messages. Assume A and B share a common key K. a. How can they achieve their goal only with secret key cryptography? b. How can they achieve their goal only with hash function (e.g., SHA-256)? c. Can they get non-repudiation? If yes, how? If no, why? d. Describe a way A and B can get non-repudiation. Explain your assumption and draw a diagram to show the procedure. 5. [5 points] What is the difference between passive and active attacks? List and briefly define categories of passive and active network attacks.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help