Cptr427MidTermExam

Material Covered

  1. Security in Computing chapters: 1, 2, 12
  2. DES and RSA Lectures

  3. Hacking Exposed Chapters 1-7 (See the Wiki entries for these chapters. If the quizzes or presentations/notes given in class are not on the wiki with the answers, contact the author.)

Specific Knowledge

Encryption

  1. Classic encryption techniques
    1. Caesar cipher
    2. Vigenere Cipher (pp. 50-53)
    3. Substitution
      1. How many keys is there in an arbitrary substitution cipher?
      2. Why does this not make the cipher safe?
    4. Permutation/Transposition
    5. Describe in detail how to break encryption algorithms based on the above cryptographic techniques.
    6. What are the eight most common letters in the English language? (p 59)
    7. The only 100% safe cipher? What was the name of the implementation of this code created at AT&T?

  2. Terminology
    1. Cryptography
    2. Cryptanalysis
    3. Cryptology
    4. encryption
    5. decryption
    6. ciphertext
    7. plaintext
    8. Hacking
    9. Cracking
  3. What are the characteristics of a Good cipher (p60, 61) Know these!
  4. Confusion and Diffusion (p63)
  5. Know DES

  6. Know RSA. Be able to do an example on the exam.

Hacking

I will give you a scenario and you describe must describe how you would used the techniques we have studied to attack the system. Hint: I'd start by following sequence discribed in the HE6 book.

Cptr427MidtermExam (last edited 2010-03-10 19:06:29 by anderson-camtasia)