Differences between revisions 1 and 7 (spanning 6 versions)
Revision 1 as of 2010-03-10 14:53:17
Size: 1175
Editor: anderson-camtasia
Comment:
Revision 7 as of 2010-03-10 19:06:29
Size: 1468
Editor: anderson-camtasia
Comment:
Deletions are marked like this. Additions are marked like this.
Line 11: Line 11:
  a. Vigenere Cipher (pp. 50-53)
Line 26: Line 27:
  a. Hacking
  a. Cracking
Line 27: Line 30:
 1. Confusion and Diffusion (p63)
Line 28: Line 32:
 1. Know [[RSA]] . Be able to do an example on the exam.  1. Know [[RSA]]. Be able to do an example on the exam.
Line 31: Line 35:
I will give you a scenario and you describe must describe how you would used the techniques we have studied to attack the system. Hint: I'd start by following sequence discribed in the HE6 book.

Cptr427MidTermExam

Material Covered

  1. Security in Computing chapters: 1, 2, 12
  2. DES and RSA Lectures

  3. Hacking Exposed Chapters 1-7 (See the Wiki entries for these chapters. If the quizzes or presentations/notes given in class are not on the wiki with the answers, contact the author.)

Specific Knowledge

Encryption

  1. Classic encryption techniques
    1. Caesar cipher
    2. Vigenere Cipher (pp. 50-53)
    3. Substitution
      1. How many keys is there in an arbitrary substitution cipher?
      2. Why does this not make the cipher safe?
    4. Permutation/Transposition
    5. Describe in detail how to break encryption algorithms based on the above cryptographic techniques.
    6. What are the eight most common letters in the English language? (p 59)
    7. The only 100% safe cipher? What was the name of the implementation of this code created at AT&T?

  2. Terminology
    1. Cryptography
    2. Cryptanalysis
    3. Cryptology
    4. encryption
    5. decryption
    6. ciphertext
    7. plaintext
    8. Hacking
    9. Cracking
  3. What are the characteristics of a Good cipher (p60, 61) Know these!
  4. Confusion and Diffusion (p63)
  5. Know DES

  6. Know RSA. Be able to do an example on the exam.

Hacking

I will give you a scenario and you describe must describe how you would used the techniques we have studied to attack the system. Hint: I'd start by following sequence discribed in the HE6 book.

Cptr427MidtermExam (last edited 2010-03-10 19:06:29 by anderson-camtasia)