0% found this document useful (0 votes)
29 views1 page

Homework 1

This document appears to be homework assignments for a network security course. It includes 9 questions related to topics like authentication requirements, encryption modes, hash functions, and RSA public/private key pairs. The questions range from 10 to 15 points and cover concepts such as confidentiality, integrity, availability, encryption block chaining modes, collision resistance, and deriving a private key from a given public key.

Uploaded by

schdoel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views1 page

Homework 1

This document appears to be homework assignments for a network security course. It includes 9 questions related to topics like authentication requirements, encryption modes, hash functions, and RSA public/private key pairs. The questions range from 10 to 15 points and cover concepts such as confidentiality, integrity, availability, encryption block chaining modes, collision resistance, and deriving a private key from a given public key.

Uploaded by

schdoel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

11210/IIS500200 Network Security, Fall 2023 Due: 7-Nov-2023

Homework 1
Instructor: Prof. Amir Rezapour

1. Consider a system that provides authentication services for critical systems, applica-
tions, and devices. Give examples of confidentiality, integrity, and availability require-
ments associated with the system. In each case, indicate the degree of importance of
the requirement. (10 points)

2. Consider a desktop publishing system used to produce documents for various organi-
zations. (15 points)

(a) Give an example of a type of publication for which confidentiality of the stored
data is the most important requirement.
(b) Give an example of a type of publication in which data integrity is the most
important requirement.
(c) Give an example in which system availability is the most important requirement.

3. Alice was told to design a scheme to prevent messages from being modified by an
attacker. Alice decides to append to each message a hash (message digest) of that
message. Why doesn’t this solve the problem? (10 points)

4. What RC4 key value will leave S unchanged during initialization? That is, after the
initial permutation of S, the entries of S will be equal to the values from 0 through
255 in ascending order. (10 points)

5. With the ECB mode, if there is an error in a block of the transmitted ciphertext, only
the corresponding plaintext block is affected. However, in the CBC mode, this error
propagates. For example, an error in the transmitted C1 obviously corrupts P1 and
P2 . Are any blocks beyond P2 affected? (10 points)

6. Is it possible to perform encryption operations in parallel on multiple blocks of plain-


text in CBC mode? How about decryption? (15 points)

7. Suppose H(m) is a collision-resistant hash function that maps a message of arbitrary


bit length into an n-bit hash value. Is it true that, for all messages x, x0 with x 6= x0 ,
we have H(x) 6= H(x0 )? Explain your answer. (10 points)

8. It is possible to use a hash function to construct a block cipher with a structure similar
to DES. Because a hash function is one way and a block cipher must be reversible (to
decrypt), how is it possible? (10 points)

9. In an RSA system, the public key of a given user is e = 3, n = 667. What is the
private key for this user? (10 points)

1-1

You might also like