Final-Knowledge-Points-Spring11.doc

Embed Size (px)

Citation preview

  • 8/14/2019 Final-Knowledge-Points-Spring11.doc

    1/4

    Knowledge Points of ITIS 6200/8200

    Spring Semester of 2011

    Chapter 1:

    1. The asi!s of modern !r"pto s"stems.

    2. #h" in the modern !r"pto s"stems we want to ma$e the en!r"ption/de!r"ption

    algorithms p%li!&

    '. (ame at least two ad)antages and two disad)antages of s"mmetri! en!r"ption

    algorithms* and pro)ide e+amples to e+plain them.

    ,. (ame at least two ad)antages and two disad)antages of as"mmetri! en!r"ption

    algorithms* and pro)ide e+amples to e+plain them.

    -. #h" do we sa" a p%li!/pri)ate $e" en!r"ption algorithm sho%ld e ro%st against

    !hosen plainte+t atta!$s&

    6. #hat is a onetime pad& #h" is it safe e)en %nder r%tefor!e atta!$s&

    . #hat is a transposition !ipher& #hat is a s%stit%tion !ipher& o% sho%ld e ale to

    pro)ide an e+ample of ea!h $ind of !iphers.

    Chapter 2:

    1. #hat are the e+pe!ted properties of a good hash f%n!tion&

    2. #h" do we !all an as"mmetri! en!r"ption algorithm a trapdoor onewa" f%n!tion&

    '. e)isit page 1 of the slides* and lin$ the f%n!tionalities of the hash f%n!tions to the

    proto!ols s%!h as it !ommitment* fair !oin flip* et!3 that we introd%!e later.

    ,. 4ow to %se the hash )al%es of the files to )erif" the integrit" of the file s"stem& #h" do

    we need a $e"ed hash f%n!tion to sol)e this prolem&

    -. 5nderstand the forward sear!h atta!$. If we des!rie a s!enario* "o% sho%ld e ale tofig%re o%t whether or not it is )%lnerale to forward sear!h atta!$* and how the atta!$ is

    !ond%!ted.

    6. #h" is it )er" diffi!%lt for an ea)esdropper to fig%re o%t the sele!ted en!r"ption in the

    er$le7s p%le proto!ol&

  • 8/14/2019 Final-Knowledge-Points-Spring11.doc

    2/4

    . 5nderstand the repla" atta!$. If we des!rie a s!enario* "o% sho%ld e ale to fig%re o%t

    the repla" atta!$. (ote that some similar atta!$ happens when we introd%!e the

    a%thenti!ation/$e" management proto!ols in Chapter '.

    8. #hen we are doing d%al as"mmetri! en!r"ption* wh" sho%ld we alwa"s sign with o%r

    pri)ate $e" first* then en!r"pt with the other part"7s p%li! $e"&

    Chapter ':

    1. #h" sho%ld we disting%ish the %sage of short term $e"s session $e"s3 and long term

    $e"s inter!hange $e"s3&

    2. 5nderstand maninthemiddle atta!$. If we des!rie a s!enario* "o% sho%ld e ale to

    fig%re o%t how the maninthemiddle atta!$ will e !ond%!ted.

    '. #h" !an an interlo!$ proto!ol defend against maninthemiddle atta!$& #hat is a good

    interlo!$ proto!ol and what is a ad interlo!$ proto!ol&

    ,. 4ow sho%ld a s"stem store the %ser names and !orresponding passwords& #h" is it not

    safe eno%gh to store the hash res%lts of the passwords& #hat is a slat& The differen!e

    etween a p%li! salt and a pri)ate salt. #h" !an a salt ma$e the di!tionar" atta!$

    impra!ti!al& #h" do we sa" that the salt impro)e the safet" of the o)erall s"stem %t not

    for a spe!ifi! %ser&

    -. 5nderstand the one$e" per time login thro%gh a hash !hain.

    6. 5nderstand the fi)e a%thenti!ation and $e" e+!hange proto!ols that we introd%!e in the

    !lass. 5nderstand their )%lnerailities and the potential atta!$s. o% do not need to

    rememer the proto!ols. #e ma" des!rie some proto!ols similar to these proto!ols and

    )%lnerale to similar atta!$s and "o% sho%ld e ale to fig%re the atta!$s o%t.

    . 5nderstand the !on!ept of se!ret splitting and se!ret sharing.

    Chapter ,:

    1. 4ow to %se a hash f%n!tion to timestamp a file&

    2. #h" !an the lin$ing proto!ol defend against the !oll%sion atta!$ etween the signer and

    the end %sers& #hat is a good !haining me!hanism&

  • 8/14/2019 Final-Knowledge-Points-Spring11.doc

    3/4

    '. 4ow !an we !onstr%!t a hash tree so that we need to p%lish onl" one res%lt and we !an

    timestamp a large n%mer of files& 4ow !an we determine the !orresponding )al%es in

    the hash tree that sho%ld e pro)ided to ea!h %ser&

    ,. 5nderstand the it !ommitment proto!ols. #h" are some !ommitment proto!ols

    )%lnerale to forward sear!h atta!$s&

    -. 4ow to %se a it !ommitment proto!ol to a!hie)e fair !oin flip&

    6. The %sage of !omm%tati)e en!r"ption f%n!tion.

    . 4ow !an m%ltiple parties generate an en!r"ption $e" 9ointl" so that the final res%lt is o%t

    of the !ontrol of an" !oll%si)e gro%ps as long as there is one honest part"& #hen we

    generalie this approa!h* how !an m%ltiple parties 9ointl" do &

    8. 4ow !an m%ltiple parties sh%ffle a de!$ of !ards 9ointl" so that no parties !an !oll%de to

    !ontrol the !ard dealing pro!ed%re&

    . The %sage of !omm%tati)e en!r"ption algorithms.

    Chapter -:

    1. #hat is a general pro!ed%re of ;ero $nowledge proof& #h" sho%ld we ma$e s%re that

    the sol%tion to the new prolem !annot e easil" mapped a!$ to the sol%tion of the

    original prolem& #hat are the

  • 8/14/2019 Final-Knowledge-Points-Spring11.doc

    4/4

    >?S and S@

    1. In >?S* whi!h !omponent !ontri%tes the most to the safet"& 4ow large is the lo!$

    sie& 4ow long is the $e"&2. #hat is the !omplementation propert" of >?S& @nd wh" does this propert" effe!ti)el"

    impa!t the safet" of the algorithm&'. #h" !annot do%le >?S ma$e the effe!ti)e $e" length to e 112 its& #hat is the meet

    in the middle atta!$& #h" !an triple >?S ma$e the effe!ti)e $e" length 112 its&,. >ifferent modes of >?S. Spe!ifi!all"* "o% sho%ld %nderstand the str%!t%re of ?CA mode

    and CAC mode. #hat se!%rit" prolems ma" e !a%sed " the ?CA mode& In the CAC

    mode* if we pro)ide one of the en!r"ption/de!r"ption !hain str%!t%res* "o% sho%ld e aleto draw the other one.

    -. #hat are the ad)antages of an initial )e!tor& #h" !an we transmit the IB in plainte+t&

    6. o% sho%ld e ale to identif" how the errors in transmission will impa!t the de!r"ptionres%lts. The selfhealing propert" of >?S.

    . o% sho%ld e ale to !ond%!t mod%lar !al!%lation %sing the e