EXAM Questions For The Course TTM4135 - Information Security August 2007
EXAM Questions For The Course TTM4135 - Information Security August 2007
August 2007
Part 1
This part consists of 8 questions all from one common topic. The number of maximal points
for every correctly answered question is given next to the question. Maximal number of
points in this part of the exam is 34. Time for work on this test: ~60 minutes.
1. Complete answer should mention that passive attacks have a nature of eavesdropping or
monitoring the transmissions, and that they are difficult to detect because they do not
involve any alternation of the data.
2. Complete answer should mention that active attacks involve some modification of the
data stream or the creation of a false stream and that it is difficult to absolutely prevent
active attacks because of the wide variety of potential physical, software and network
vulnerabilities.
4. Complete answer should mention analysis of the patterns of the messages, location and
identity of communication hosts and frequency and length of messages being exchanged.
5. Complete answer should define masquerade as an attack where one entity pretends to be a
different entity.
6. Complete answer should define replay as an attack that involves a passive capturing of a
transmitted data and its subsequent retransmission to produce an unauthorized effect.
7. Complete answer should define modification of message as an attack where some portion
of a legitimate message is altered, or delayed or reordered to produce an unauthorized
effect.
8. Complete answer should define the denial of service as an attack that prevents or inhibits
the normal use or management of communication facilities (either they are specific
targets or entire networks).
EXAM questions for the course TTM4135 - Information Security
August 2007
Part 2
This part consists of 7 questions all from one common topic. The number of maximal points
for every correctly answered question is given next to the question. Maximal number of
points in this part of the exam is 34. Time for work on this test: ~60 minutes.
1. (6 points) What are the two most difficult problems of symmetric cryptography that
public-key cryptography solves?
2. (6 points) How asymmetric encryption/decryption works?
3. (3 points) What is the most widely used public-key crypto system?
4. (6 points) Describe the Diffie-Helman key exchange?
5. (7 points) Describe the RSA algorithm?
6. (3 points) On which mathematical problem RSA bases its security?
7. (3 points) On which mathematical problem Elliptical Curves Cryptography bases it
security?
KEY for Part 2
2. Complete answer should mention that asymmetric cryptosystem encrypts with one key
(called public key) and decrypts with another key (called private key).
3. RSA
5. Key generation:
Select two prime numbers p and q such that p ≠ q,
Calculate n = p q
Calculate Phi(n) = (p – 1) (q – 1)
Select an integer e such that: gcd (Phi(n), e) = 1, 1 < e < Phi(n)
Calculate d = e-1 mod Phi(n)
Public key: (e, n)
Private key: (d, n)
Encryption:
Plaintext: M<n
Ciphertext: C = Me mod n
Decryption:
Ciphertext C
Plaintext: P = Cd mod n
6. On the difficulty of finding prime factors of a composite number (factorization of natural
numbers).
Part 3
This part consists of 20 questions. For every question 5 alternative answers are given, of
which ONLY ONE is correct. If you chose the correct answer you will earn 1.6 points,
otherwise you will loose 0.4 points (i.e. the penalty is -0.4 points). If you not choose any
answer - then you will not get any points (i.e. the earned points are 0). Maximal number of
points in this part of the exam is 32. Time for work on this test: ~60 minutes.
2. Which two types of attacks on DES are slightly better than brute-force key search?
a. Factorization of numbers and Discrete logarithm
b. Differential cryptanalysis and Linear cryptanalysis
c. Statistical cryptanalysis and Testing of randomness
d. Embedded cryptanalysis and Multidimensional cryptanalysis
e. General Number sieve and Polynomial Quantum Factorization
3. LUCIFER was the predecessor of DES and had the key length of:
a. 128 bits
b. 96 bits
c. 80 bits
d. 64 bits
e. 56 bits
5. AES uses:
a. 128, 160 or 256 bits block size and a key size of 128, 160 or 256 bits
b. 512 bits block size and a key size of 128, 256 or 512 bits
c. 128, 256 or 512 bits block size and a key size of 128, 192 or 256 bits
d. 128, 192 or 256 bits block size and a key size of 128, 192 or 256 bits
e. 128 bits block size and a key size of 128, 192 or 256 bits
6. RC4 is:
a. A stream cipher with variable key length
b. A stream cipher with 128 bits key length
c. A block cipher with variable key length
d. A block cipher with 128 bits key length
e. A hash function with 128 bits hash output
11. Two most common cryptographic techniques for message authentication are:
a. Digital signatures and key production
b. Encryption and decryption
c. Digital signatures and encryption
d. Universal hashing and digital signatures
e. MAC and secure hash function
2. b
3. a
4. c
5. e
6. a
7. d
8. a
9. b
10. d
11. e
12. b
13. a
14. c
15. b
16. d
17. a
18. c
19. c
20. b