9608/31/M/J/16 © Ucles 2016
9608/31/M/J/16 © Ucles 2016
2 Digital certificates are used in Internet communications. A Certificate Authority (CA) is responsible
for issuing digital certificates.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ............................................................................................................................................[3]
1 A user starts an application for a digital certificate using their computer. On this computer
a key pair is generated. This key pair consists of a public key and an associated private
key.
2 The user submits the application to the CA. The generated ........ (i) ........ key and
other application data are sent. The key and data are encrypted using
the CA’s ........ (ii) ........ key.
3 The CA creates a digital document containing all necessary data items and signs it using
the CA’s ........ (iii) ........ key.
In the above method there are three missing words. Each missing word is either ‘public’ or
‘private’.
(i) ...........................................................................................................................................
Justification ........................................................................................................................
.......................................................................................................................................[2]
(ii) ...........................................................................................................................................
Justification ........................................................................................................................
.......................................................................................................................................[2]
(iii) ...........................................................................................................................................
Justification ........................................................................................................................
.......................................................................................................................................[2]
Beena’s email program decrypts the encrypted message using her private key.
.......................................................................................................................................[1]
(ii) Explain how Beena can be sure that she has received a message that is authentic (not
corrupted or tampered with) and that it came from Alexa.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(iii) Name two uses where encrypted message digests are advisable.
1 ........................................................................................................................................
2 ....................................................................................................................................[2]
Description Term
Malware that attaches itself to another program.
(b) Ben wants to send a highly confidential email to Mariah so that only she can read it. Plain text
and cipher text will be used in this communication.
...........................................................................................................................................
...................................................................................................................................... [2]
(ii) Explain how the use of asymmetric key cryptography ensures that only Mariah can read
the email.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [4]
2 The following incomplete table shows descriptions and terms relating to malware.
Description Term
(i) A standalone piece of malicious software that can
replicate itself using a network. ...................................... [1]
(ii) Use email to attempt to obtain an individual’s
confidential data. ...................................... [1]
(iii)
.................................................................................
.................................................................................
.................................................................................
Virus
.................................................................................
.................................................................................
................................................................................. [2]
(b) State two vulnerabilities that the malware in part (a)(i) or part (a)(iii) can exploit.
Vulnerability 1 ...........................................................................................................................
...................................................................................................................................................
Vulnerability 2 ...........................................................................................................................
...................................................................................................................................................
[2]
(c) Anna has to send an email to Bob containing confidential information. Bob and Anna have
never sent emails to each other before.
The first step is for Anna to request that Bob sends her one of his keys.
(ii) Explain how Anna can be sure that it is Bob who has sent the key.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
The following incomplete table shows the sequence of actions between Anna and Bob to
communicate the confidential information.
The person
performing the What that person does
action
Bob
..........................................................................................................
Anna
..........................................................................................................
..........................................................................................................
Bob
..........................................................................................................
[4]
Variable
Letter
[2]
...................................................................................................................................................
...................................................................................................................................................
[2]
4 The Secure Socket Layer (SSL) protocol and its successor, the Transport Layer Security (TLS)
protocol, are used in Internet communications between clients and servers.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [3]
(b) A handshake process has to take place before any exchange of data using the TLS protocol.
The handshake process establishes details about how the exchange of data will occur. Digital
certificates and keys are used.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
(c) Give two applications where it would be appropriate to use the TLS protocol.
1 ...............................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
[2]
Put a tick (✓) in each row to identify the computer architecture associated with each statement.
Architecture
Statement
SIMD MIMD SISD
6 (a) The following table shows descriptions and terms relating to data transmission security.
Description Term
The result of encryption that is transmitted to the
A
recipient. .................................
The type of cryptography used where different keys are
B
used; one for encryption and one for decryption. .................................
.........................................................................................
.........................................................................................
C Digital certificate
.........................................................................................
.........................................................................................
.........................................................................................
.........................................................................................
D Private key
.........................................................................................
.........................................................................................
[4]
(b) The sequence of steps 1 to 7 describes what happens when setting up a secure connection
using Secure Socket Layer (SSL).
If the browser trusts the certificate, it creates, encrypts and sends the server a
A
symmetric session key using the server’s public key.
B Server sends the browser an acknowledgement, encrypted with the session key.
C Server sends a copy of its SSL Certificate and its public key.
D Server decrypts the symmetric session key using its private key.
2. ……………
4. ……………
5. ……………
6. ……………
7. Server and browser now encrypt all transmitted data with the session key.
[3]
BLANK PAGE
BLANK PAGE
5 (a) Wiktor is an employee of a travel agent. He uses asymmetric encryption to send confidential
information to his manager.
data. When Wiktor sends a message to his manager, the message is encrypted into
When the manager replies, the message is encrypted using Wiktor’s …………………………….
key, and when Wiktor receives the message, it is decrypted into …………………………….
(b) When customers pay for their travel booking online, a secure connection is established using
Secure Socket Layer (SSL).
Explain how the customer’s browser and the server used to collect the payment will establish
a secure connection.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(c) The manager is concerned about the threat of malware to the company computer systems.
Name two types of malware. State what the company should do to help prevent the effect of
the malware.
Prevention ................................................................................................................................
...................................................................................................................................................
Prevention ................................................................................................................................
...................................................................................................................................................
[4]
5 Sanjeet is a member of the public, and he wants to send a private message to a government
department.
(a) Explain how asymmetric encryption is used to ensure that the message remains private.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) When the government department replies to Sanjeet, it needs to send a verified message.
Explain how asymmetric encryption can be used to ensure that it is a verified message.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(i) Describe two vulnerabilities that malware can exploit in computer systems.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 .........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(ii) Identify one method that can be used to restrict the effect of malware.
...........................................................................................................................................
..................................................................................................................................... [1]
© UCLES 2019 9608/32/M/J/19
QUESTION 13. 12
8 Digital certificates are used in internet communications. A Certificate Authority (CA) is responsible
for issuing a digital certificate.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) The following paragraph describes how a digital signature is produced. Complete the
paragraph by inserting an appropriate term in each space.
plain text message. The message digest is ................................................ with the sender’s
................................................ .
[3]