Cptr427MidTermExam
Material Covered
- Security in Computing chapters: 1, 2, 12
- Hacking Exposed Chapters 1-7 (See the Wiki entries for these chapters. If the quizzes or presentations/notes given in class are not on the wiki with the answers, contact the author.)
Specific Knowledge
Encryption
- Classic encryption techniques
- Caesar cipher
- Vigenere Cipher (pp. 50-53)
- Substitution
- How many keys is there in an arbitrary substitution cipher?
- Why does this not make the cipher safe?
- Permutation/Transposition
- Describe in detail how to break encryption algorithms based on the above cryptographic techniques.
- What are the eight most common letters in the English language? (p 59)
The only 100% safe cipher? What was the name of the implementation of this code created at AT&T?
- Terminology
- Cryptography
- Cryptanalysis
- Cryptology
- encryption
- decryption
- ciphertext
- plaintext
- Hacking
- Cracking
- What are the characteristics of a Good cipher (p60, 61) Know these!
- Confusion and Diffusion (p63)
Know DES
Know RSA. Be able to do an example on the exam.
Hacking
I will give you a scenario and you describe must describe how you would used the techniques we have studied to attack the system. Hint: I'd start by following sequence discribed in the HE6 book.