Assignment 3 (4)

pdf

School

University of Regina *

*We aren’t endorsed by this school

Course

890

Subject

Computer Science

Date

Jan 9, 2024

Type

pdf

Pages

2

Uploaded by CountLeopardPerson1481

Report
Assignment Three (CS 890DJ, Fall 2023) (Updated Due: Nov 27, 11:59 pm) Note: Questions 5 weighed 10 marks, and other questions weighed 5 marks each. This makes the total of the assignment 3 to be 75 marks. However, this course plans to use a sample-based approach to the marking of the assignments. You will be expected to complete the assignments fully. However, the course instructor will select a subset of items to be marked (a sample of your work). The Teaching Assistants will be instructed to only mark these items, which will result in your grade on the assignment. 1. Please use a few sentences of your own words to describe the data security lifecycle model as discussed in the class (6 major phases). Please also use your own words to describe the basics of classifying and labeling data to make sure it is treated and controlled in a manner consistent with the data’s sensitivity. 2. Please use your own words to describe what is required to complete the data lifecycle by documenting retention requirements and ensuring the destruction of data that is no longer in use. 3. Please use your own words to describe the following symmetric encryption process. 4. What is the objective of attacking an encryption system? Please use your own words to explain what are cryptanalysis and brute-force attack. 5. Key: K = 17 17 5 21 18 21 2 2 19 , Inverse of the Key: K -1 = 4 9 15 15 17 6 24 0 17 1) Encrypt the message “MEET ME AT THE USUAL PLACE” using the Hill cipher (plaintext and ciphertext as column vectors, which the column vector is placed after the key matrix) with the key K. Show your calculation steps and the result. 2) Show the calculations for the corresponding decryption of the ciphertext to recover the original plaintext. 6. Please use your own words to explain the classic Roter Machines discussed in the class.
7. Please use your own words to explain what is a stream cipher and what is a block cipher. 8. Please use your own words to explain asymmetric encryption (Public-Key Cryptography). 9. Please use your own words to explain the cryptographic hash function. 10. Please use your own words to explain the attacks and forgeries related to digital signatures discussed in the class. 11. What is the difference between statistical randomness and unpredictability (use your own words)? 12. Please use your own words to describe the concepts of configuration management. 13. Please list the names of the common security policies and explain them using your own words one by one briefly. 14. Please use your own words to explain the importance of security awareness training.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help