عماد فاينل
عماد فاينل
عماد فاينل
simple method for factoring large primes, one possible solution is quantum cryptography.
17 Even where biometric systems are more secure than conventional systems, they still have vulnerabilities.
Explain briefly, two of these vulnerabilities.
1. Some biometric identifiers may be acquired covertly and could be used to make fake objects designed to
fool automatic biometric recognition systems. For example, a photograph of a face can be taken
remotely and without the subject’s knowledge Fingerprints can be taken from smooth surfaces that the
subject touched.
2. Biometric systems, especially unsupervised ones, can be accidentally damaged or even vandalized. The
sensor, which is usually situated at an exterior location for obtaining biometric samples, is particularly
vulnerable. When a sensor is malfunctioning the whole system will not work!
3. A biometric system, and in particular a biometric identification system, requires a database to store the
biometric templates. The database usually stores information of a population of users. If this database is
corrupted or stolen, the identities of those users may be compromised.
18 Explain briefly, the two basic stages required to perform Analogue-to-digital conversion process. ****
1. Sampling: which to measure the instantaneous amplitude of the analogue sound signal at regular
intervals. The result is a set of voltage levels which represent the signal’s level at the instants the
samples were taken.
2. Quantization: which is to divide the maximum voltage range of the analogue sound signal into a number
of discrete voltage bands and assimilate each sample into a voltage band.
19 Electronic funds transfer (EFT) is a generic term that is used to describe financial transactions carried out by
computer-based systems. This includes a wide variety of possible transactions. Mention three of these
transactions. *
1. The stream of digital audio samples is sent first to a filter-bank which splits the audio into 32 frequency
bands that match the frequency characteristics of the human ear.
2. Mentioning one of the following: (2 Marks)
- The sound content of each band is analysed and coded using a psychoacoustic algorithm such as
to require the lowest possible amount of data for the given content.
- Sounds that cannot be heard, such as those masked by louder ones and those below the hearing
threshold, are removed.
- As the ear cannot determine the position of sounds with frequencies below 100 Hz, the stereo
information for those frequencies is also discarded.
3. Mentioning one of the following: (2 Marks)
- By varying the sample rate (i.e. discarding a variable proportion of the samples on a regular
basis) the coder can allocate more samples to complex sounds and fewer to a less complex
sound, adding further to the coding efficiency.
- The compressed digital audio data (which is not now in a simple sample-by-sample form) is
divided into blocks and lossless Huffman coding is used to reduce the data requirement to a
minimum.
25 Draw a graph that illustrates how the FMR and FNMR vary with respect to the threshold of a biometric
recognition system. Then, identify and annotate the following points on your graph: ZeroFMR, ZeroFNMR and
EER.
26 Briefly explain why sound waves are pressure waves? Why they are considered as traveling waves? And when
a sound wave is considered as cyclical wave?
- Sound waves are pressure waves because they consist of cyclical changes of pressure.
- Sound waves are travelling waves because the pressure variations radiate outwards from their source,
conveying energy away from the source.
- A sound wave is considered as cyclical when sound consists of cycles of repeating air pressure variations
(the student can also say: when sound contains only one frequency. Or if the student gives a correct
example, it can also be considered as correct).
27 The thresholds used in biometric recognition systems set the balance point between security and
convenience, based on that differentiate between false non-match and false match?
- False non-match: When a threshold is set too high biometric data from the same person can appear not
to match because of slight variations.
- False match: When a threshold is set too low different biometric data can appear to match when they
are not the same.
28 What will be the consequence if false match occurred? And what will be the consequence if false non-match
occurred?
- False match: The consequence is that imposters could gain access to resources they are not allowed to
access → Less security
- False non-match: The consequence is that legitimate users could be refused access to resources they are
entitled to access. → Less convenience
29 What TLS/SSL stands for? (2 marks)
Transport Layer Security (TLS) and Secure Sockets Layer (SSL).
30 The data stored in the magnetic stripe of a standard ID-1 payment card includes: Card Verification Value 1
code (CVV1), CVV2, and PIN Verification Value – PVV. What are the differences between them?
- CVV2 is printed on the card. (1 mark)
- Card Verification Value 1 code (CVV1) used to support the authenticity of the card and it is recorded
electronically on the card (2 marks) Any of the following (2 marks)
- PIN Verification Value (PVV) is an encrypted representation of the corresponding account PIN and it is
created by the card issuer.
- PVV is used to verify the user-entered PIN when, for example, you are using a bank ATM.
31 In an ATMmagnetic stripe card transaction, a derived PIN Verification Value-PVV (the processing of which
involves the user’s entered PIN in combination with other account data and a one-way function) is compared
with the PVV for the account (stored on the magnetic stripe and in a bank’s database). Plaintext PINs are not
used as the basis of this comparison. Explain why a ciphertext representation (PVV) rather than a plaintext
representation of a PIN should be used for storing the PIN data on a magnetic stripe (only) card? *
A PVV is a ciphertext representation of a PIN and so can be included in the encoded information on a card’s
magnetic stripe. If a PVV is accessed by a fraudster, the process used to create the PVV, which includes the use of
a oneway function, should ensure that the PIN cannot be accessed. It would certainly be unsafe to include the
plaintext version of the PIN within the magnetic stripe data.
32 Describe in details how the transaction occur In a Dynamic Data Authentication (DDA)?
- The terminal sends a “challenge” to the card. A challenge is in the form of a message sent by the
terminal to the card. The message incorporates unpredictable data such as that derived from the
particular transaction being undertaken.
- The card responds to the challenge it receives by returning the challenge data to the terminal encrypted
with its own private key.
- If the decrypted response received from the card matches the terminal’s original copy of the challenge
data, the card is dynamically authenticated to the terminal.
33 What Intrusion detection systems are commonly used for? Mention only three points
- They continually monitor activities to identify those that are suspicious and which could indicate the
start of an attack.
- They can detect potential threats arising from the actions of ‘trusted’ insiders as well as external
hackers.
- They use detailed knowledge about the systems and networks being protected
- They compare current use with normal patterns of service usage so that suspicious activity can be
flagged. Suspicious activity may lead to temporarily restrict access to, or disable the systems or functions
that could be under threat.
34 Explain the process of ATM transactions using magnetic stripe cards? (Hint: you can explain the process of
ATM transactions using magnetic stripe cards through a Figure.)
1. On presenting a card to an ATM, a user will be prompted to enter an account PIN using the terminal
keypad.
2. Information on the card’s stripe is read, including the PVV.
3. The two inputs (the user-entered PIN and the magnetic stripe data read by the ATM) are encrypted for
transmission to the location of a bank’s Hardware Security Module (HSM).
4. On arrival, the incoming data is decrypted so that the entered PIN, the PVV and the related account data
are recovered.
5. The HSM ensures that a transaction will only be authorised if the correct PIN is entered
6. A PVV value is derived
7. The derived PVV could be compared with the original PVV value for the related account.
8. If the derived PVV does not match the actual PVV, the transaction will be denied (1 mark for each point
from 1 to 4) (2 marks for last point)
OR through a figure
35 How Aliases can be avoided? And how the quantization error is minimized?
43 How do humans hear SOUND, list all details starting from source of sound? *
- The source of sound creates small rapid fluctuations of the atmospheric air pressure that surrounds it.
- The atmospheric fluctuations spread outwards from the source through the surrounding air. (1 mark)
- When the pressure variations achieve the listener, they act on the listener’s hearing mechanism.
- The movements of the eardrum are detected by the hearing mechanism and are interpreted by the brain
as sound. (2 marks)
44 When someone logs on to a secure site (indicated by ‘https’ in the URL), the site’s server automatically sends
its digital certificate to his/her computer by means of security processes that are carried out using a collection
of algorithms operating together under the umbrella of a security protocol that provides interoperability for
secure interaction between applications. What may the security protocol include? (4 marks)
- An algorithm for authenticating the communicating parties to each other.
- An algorithm for generating a shared secret key.
- An algorithm for encryption.
- An algorithm for checking integrity.
45 List two examples of the common encryption algorithms?
DES, 3DES, RSA, AES, RC2, RC4, RC5, IDEA…
46 Compare between the magnetic stripe card and Dynamic Data Authentication card (DDA)?
Magnetic stripe payment card:
- The data storage capacity is very limited and is totally passive. o There is no ability to carry out any on-
board computational processes.
- The data written to and stored on the magnetic stripe is intended to be permanent.
EMV DDA card:
- has an embedded microprocessor and various types of semiconductor memory allowing it to process
data on board.
- can monitor card activity and execute its issuer’s policies.
- has a co-processor that can execute sophisticated encryption of messages used.
47 When the hash function is encrypted by with the sender’s private key, the outcome is referred to as what?
digital signature
48 What are the benefits of encrypting the hash function by the sender’s private key?
Integrity of the message and authentication of sender.
49 List three disadvantages of Electronic Codebook (ECB) and two disadvantages of Cipher-block chaining (CBC)?
Drawbacks of ECB:
- Two similar blocks of plaintext will result in similar blocks of ciphertext
- Since the position of the ciphertext blocks remains fixed relative to the plaintext blocks this introduces a
vulnerability.
- ECB is not practical when data involves long repetitive strings of 1s and 0s, such as a picture data.
Drawbacks of CBC:
- A single encryption error in one block is cascaded through to the following blocks.
- The decryption relies on knowledge of the previous block.
50 Matching methods for fingerprints can be broadly classified into three categories: Correlation-based,
Minutiae-based and Ridge-feature-based matching. Explain the main idea of each category.
Correlation-based matching works by superimposing one image over another image and changing their
alignments (1 Mark) until the correlation between the corresponding pixels of the two images is maximised. (1
Mark)
In Minutiae-based matching, the matching is conducted by working out the similarity between Minutiae instead
of all pixels. (2 Marks)
In a Ridge-feature-based matching, other ridge features may be used to help in matching fingerprints (1 Mark)
such as: ridge orientation, ridge frequency, shape and texture, and ridge counts between minutiae (1 example: 1
Mark)
51 For the transactions that follow, how strong you believe the resulting authentication to be (strong or weak):
Using an ATM to obtain cash; Purchasing goods or services on the internet using a credit card? Argument your
answers (two arguments each).
Using an ATM to obtain cash:
- We need to have the bank card: Something we have (1 Mark)
- We need to know the PIN: Something we know (1 Mark)
- Two factors are satisfied so strong authentication. (1 Mark)
Purchasing goods or services on the internet using a credit card:
- We need to know card and personal details (e.g. card number and type, validity dates and card ‘security
code’: Something we have
- We are also normally required to give a Card Verification Value (CVV) specifically (CVV2) : Something we
have
- Providing this value gives some assurance (but not proof) that we do have the payment card in our
possession: Something we have
- The authentication is essentially single factor, so this is weak authentication (1 Mark)
52 In the context of EMV smart cards, a DDA transaction involves not only static data as stored on an SDA card,
but also dynamic data used in a challenge–response interaction. What constitutes a challenge message (and
provide example)? And explain how a DDA transaction is conducted.
A challenge incorporates unpredictable data (1 Mark) such as that derived from the particular transaction being
undertaken (1 Mark).
DDA transaction:
- The terminal sends a “challenge” to the card. (1 Mark)
- The card responds to the challenge it receives by returning the challenge data to the terminal encrypted
with its own private key. (1 Mark)
- If the decrypted response received from the card matches the terminal’s original copy of the challenge
data (1 Mark: “challenge and response are compared”), the card is dynamically authenticated to the
terminal. (1 Mark: “result”)
53 Converting an analogue audio signal to a digital signal requires two basic stages: Sampling and quantisation.
What is sampling and how often does the sound signal need to be sampled (minimum sampling rate)? Then,
explain the quantisation process.
- Sampling: to measure the instantaneous amplitude of the analogue sound signal at regular intervals. (1.5
Marks)
- Minimum sampling rate: twice bigger than the highest frequency in the sound signal (or students can say
44KHz or 40 KHz) (1.5 Marks)
- Quantisation: the maximum voltage range of the analogue sound signal is divided into a number of
discrete voltage bands (or levels). (1.5 Marks)
- Each sample is assimilated/approximated into a voltage band (or level) and therefore given the number
which represents this band. (1.5 Marks)
54 A digital audio file can be compressed before being stored. What is digital compression? What is the
difference between a lossless and lossy compression? And provide one advantage for each compression type
(lossless and lossy).
Digital compression involves minimising the amount of digital data that a sound signal requires.
With lossless compression, the digital data is stored in a compressed form such that it can be recovered, sample-
for-sample with nothing altered. In contrast, with lossy compression, some information in the digital audio signal
is removed (1.5 Marks).
Lossless compression advantage: Nothing is taken away or lost (same sound quality) (1 Mark)
Lossy compression advantage: Higher compression ratios (1 Mark)
55 In the context of sound characteristics, what is “pitch” (provide an example) and what are the differences
between “frequency” and “pitch”? Give at least two differences.
Pitch: is a term we humans use when we talk about how high or how low a sound is. (1.5 Marks)
One correct example:
We may say, for example, that men generally have lower pitched voices than women; or we may say a smoke
alarm has a very piercing high-pitched sound.
Differences between pitch and sound:
- Pitch therefore is a subjective term (subjective property of humans), whereas frequency is a measurable
physical quantity. (1.5 Marks)
- A linear change in pitch corresponds roughly to a multiplicative change in frequency. (1.5 Marks)
56 Both optical and solid-state fingerprint sensors can be designed to acquire images through users either
touching them or sweeping their fingers over them. Draw a comparison table that summarizes four
differences between a touch sensor and a sweep sensor.
Optical Solid State
Sensing area cover the whole fingertip Cover only a fraction of the size of fingertip
Capture the fingertip in one go Capture only a slice at a time
Expensive Cheaper
Simpler to produce and easier to use Sweep required to be at a steady speed and
pressure
Can’t fit in portable devices Can fit in portable devices
Fraudsters can lift a latent fingerprint off a the sweep action ‘cleans up’ the sensor on each
sensor in order to make a duplicate of it sweep so that no latent
fingerprint is left on the sensor
57 In implementing an electronic voting system, the privacy of the ballot and the issue of “prying” is crucial in
democratic elections. List three of such issues.
- So who would supply the voting computers?
- Who would program and maintain them?
- How would we check they are programmed fairly and without errors?
- What would we do if they break down during an election? How can they be kept secure and how can we
be sure they have not been compromised?
- How can we check they have provided the correct result? Will people be prepared to use them?
58 The ability to intrude into an individual’s life using information found solely online is unprecedented and is a
relatively recent phenomenon. What has changed in the recent years to make this happen?
- The rise of Web 2.0. Companies such as MySpace, Facebook, blogging sites, YouTube and Friends
Reunited began to emerge.
- This new wave differs from the first-generation Web 1.0 companies (Amazon, eBay and Egg) by being
driven primarily by user generated content.
- This means that the bulk of the content that makes up a Web 2.0 website is contributed by its individual
users rather than the company itself.
59 Mention five of the UK government’s large-scale electronic databases.
- electoral registers
- birth
- marriage and death registers
- planning applications
- National Health Service
60 In your study of fingerprints, you have met the term minutia. What is minutia? Mention three types of
minutia.
- Minutia is the point where a ridge line is discontinuous.
- Many types of minutiae can be identified from fingerprints, but the most common ones are termination,
bifurcation, lake, independent ridge, island or point, spur and crossover.
61 From your study of “Money in Plastic”, what threats to SDA card security could arise that would be unlikely to
arise with DDA?
- The signed data that was written into an SDA memory by an issuing bank doesn’t change with time, so
there is a danger it could be captured ‘wholesale’ and used to create cloned cards by writing it into other
smart cards.
- Captured data could alternatively be used to create fake magnetic stripe cards usable in some countries
or regions where they continue to be accepted.
- A DDA card could not be used in this way because the DDA process requires a valid card response to a
unique challenge sent by the terminal.
- To create a valid response to such a challenge requires the use of the card’s private key which is stored
in a secure memory location.
62 You have studied some methods and strategies that are employed by those with malicious or criminal intent.
One of these methods is “Phishing”. Briefly describe this method.
Phishing: is where potential victims are lured into following links to fake websites where they are encouraged to
reveal personal details or information such as passwords, PINs or security codes, which fraudsters subsequently
use.
63 A tuning fork has a frequency of 384 Hz. Find the wavelength of this sound, given that the speed of sound is
340 metres per second.
Using λ = v/f = the wavelength in metres is 340÷384 = 0.885 metre.
64 As long as the sound stays in a digital form, any sort of processing of the sound is simply a matter of ‘number
crunching’. “Echo” and “Chorus” are two kinds of such processes. Give a brief definition of each.
Echo is the process whereby a delayed version of the sound is added to the un-delayed sound. Chorus is an
effect only heard with music, and occurs when a number of similar instruments or voices play/sing the same
tune together.
65 The architecture of biometric systems consists of five different components. One of these components is the
feature extractor. Explain the function of this component.
Feature extractor:
- Takes the raw data from the sensors as an input, extracts from it the key features and converts them
into a digital representation called a template.
- can be seen as a form of non-reversible compression
- It significantly reduces the complexity of the original biometric sample, decreases the resources required
to store and process the biometric and prevents the original biometric data from being reconstructed
from the template.
- Some systems further process the templates by incorporating encryption so the data is better protected.
66 You have studied two main sensor types for fingerprints scanning: optical and solid state. Discuss the solid-
state sensor by explaining the main idea behind its technology and how it functions.
- Solid-state sensors were originally designed with the aim of reducing the physical size and cost of the sensors.
- The idea was to build an all-in-one silicon chip with a two-dimensional sensory array placed directly on the chip.
-When providing a fingerprint image, users touch the sensing surface of the chip directly.
-Instead of converting optical patterns to electrical signals, solid-state sensors convert thermal,
capacitive, piezoelectric or electric field information to electrical signals.
- Capacitive sensors are the most common type employed, because of their simplicity and low cost.
67 From your study of “Money in Plastic”, you there are several EMV chip and PIN variants. One of them is the
DDA (Dynamic Data Authentication). Describe this kind of cards.
- A DDA transaction involves not only static data as stored on an SDA card, but also dynamic data used in a
challenge–response interaction.
- The integrated circuit chip on a DDA card includes a co-processor that can carry out cryptographic
processes on the card.
- The card uses this capability to respond to a challenge initiated by the terminal.
- The challenge is in the form of a message sent by the terminal to the card.
- The message incorporates unpredictable data (such as that derived from the particular transaction being
undertaken).
- The card responds to the challenge it receives by returning the challenge data to the terminal encrypted
with its own private key.
- If the decrypted response received from the card matches the terminal’s original copy of the challenge
data, the card is (dynamically) authenticated to the terminal.
- The DDA card authentication process allows a card to be authenticated offline.
- However, a bank will still periodically force transactions to be completed online to allow it to monitor
and control account activity as needed.
- By monitoring account activity, a bank can also institute other risk management policies.
- Aspects of account activity that may give rise to concern include unusual changes in the frequency,
amount and locations of transactions.
68 The basic function of a microphone is to convert the variations in air pressure that form sound waves into
equivalent variations in electrical voltage. There are three main ways of doing this; one of them is by using
“electromagnetic induction.” Explain this method and use schematic diagram to explain your idea.
- Electromagnetic induction is a physical effect whereby if an electrical conductor is moved in a magnetic
field, it has an electrical voltage induced in it.
- A microphone that uses electromagnetic induction is called a moving-coil or dynamic microphone.
- The diaphragm is a lightweight and flexibly suspended membrane.
- When sound waves reach the diaphragm, they cause it to vibrate in sympathy with the pressure
variations.
- Due to electromagnetic induction, this induces a similar voltage variation across the ends of the coil
which is suspended in a strong magnetic field, and to which the diaphragm is attached.
- The small induced voltage can then be amplified to produce a more usable electrical signal.
69 During a point of sale transaction, explain, step by step, how payment by imprinting is achieved.
- The card was handed to a check-out assistant.
- The visible embossed card data was transferred on to a transaction slip using a machine called a PDQ
imprinter.
- Other details of the goods purchased and the price were added to the transaction slip.
- The customer signed it to complete the purchase.
70 Explain briefly, why sound waves are considered as pressure traveling waves?
Sound waves are pressure waves because they consist of cyclical changes of pressure. Sound waves are travelling
waves because the pressure variations radiate outwards from their source, conveying energy away from the
source.
71 The threshold used in biometric recognition systems set the balance point between security and convenience.
Explain, briefly this effect for the threshold.
To increase the system SECURITY, the threshold should be set high
Only fingerprints with high similarity values are considered as Match
• BUT in this case, false non-match can occur.
• When a threshold is set too high biometric data from the same person can appear not to match
because of slight variations.