1175
Comment:
|
← Revision 7 as of 2010-03-10 19:06:29 ⇥
1468
|
Deletions are marked like this. | Additions are marked like this. |
Line 11: | Line 11: |
a. Vigenere Cipher (pp. 50-53) | |
Line 26: | Line 27: |
a. Hacking a. Cracking |
|
Line 27: | Line 30: |
1. Confusion and Diffusion (p63) | |
Line 28: | Line 32: |
1. Know [[RSA]] . Be able to do an example on the exam. | 1. Know [[RSA]]. Be able to do an example on the exam. |
Line 31: | Line 35: |
I will give you a scenario and you describe must describe how you would used the techniques we have studied to attack the system. Hint: I'd start by following sequence discribed in the HE6 book. |
Cptr427MidTermExam
Material Covered
- Security in Computing chapters: 1, 2, 12
- Hacking Exposed Chapters 1-7 (See the Wiki entries for these chapters. If the quizzes or presentations/notes given in class are not on the wiki with the answers, contact the author.)
Specific Knowledge
Encryption
- Classic encryption techniques
- Caesar cipher
- Vigenere Cipher (pp. 50-53)
- Substitution
- How many keys is there in an arbitrary substitution cipher?
- Why does this not make the cipher safe?
- Permutation/Transposition
- Describe in detail how to break encryption algorithms based on the above cryptographic techniques.
- What are the eight most common letters in the English language? (p 59)
The only 100% safe cipher? What was the name of the implementation of this code created at AT&T?
- Terminology
- Cryptography
- Cryptanalysis
- Cryptology
- encryption
- decryption
- ciphertext
- plaintext
- Hacking
- Cracking
- What are the characteristics of a Good cipher (p60, 61) Know these!
- Confusion and Diffusion (p63)
Know DES
Know RSA. Be able to do an example on the exam.
Hacking
I will give you a scenario and you describe must describe how you would used the techniques we have studied to attack the system. Hint: I'd start by following sequence discribed in the HE6 book.