Midterm Assessment - Answer Key: Faculty of Computer Studies T215B Communication and Information Technologies (II)
Midterm Assessment - Answer Key: Faculty of Computer Studies T215B Communication and Information Technologies (II)
T215B
Communication and Information Technologies (II)
Midterm Assessment
Version 2 – Answer Key
Spring – 2012/2013
Day and Date
Number of Exam Pages: Time (2)
()
(Including this cover sheet) Allowed: Hours
Instructions:
1) What is the decryption key for the Caesar cipher with encryption key of 15?
a. 15
b. 11
c. 26
d. 5
e. 30
2) The method of trying all possible combinations in a key space is known as:
a. Linguistic attack
b. Scytale
c. Brute force attack
d. Bitcoin
e. None of the above
3) Whether accomplished in hardware or software, encryption frequently involves an
operation known as the:
a. XNOR process
b. XOR process
c. NOR process
d. NAND process
e. None of the above
4) The quantum cryptography works by exploiting properties of _______ to distribute a
secret key that can then be used to encrypt messages in the traditional way.
a. protons
b. neutrons
c. electrons
d. photons
e. none of the above
5) One of the characteristics of biometrics against which it can be judged is________ where
it indicates how well the biometric remains the same over time.
a. Distinctiveness
b. Permanence
c. Universality
d. Collectability
e. None of the above
6) ________________are the ones most commonly used by fingerprint recognition systems.
a. Lake and independent ridge
b. Termination and bifurcation
c. Island and spur
d. Spur and crossover
e. c and d.
11) Identity is closely tied to and often confused with two other important concepts:
authorisation and authentication. From your study, define these three terms: identity,
authorisation and authentication.
• Identity is about who you are; the means through which this is typically detected
or verified.
• Authentication is (usually) about proving who you are
• Authorisation is about what you are permitted to do.
12) Privacy comes in many forms, relating to what it is that one wishes to keep private. In
this context, you have studied the following terms: privacy of identity and privacy of
self-determination. Define each one of them.
15) There are two basic methods for creating a cipher: substitution cipher and transposition
cipher. What is the major difference between these two methods?
• Substitution cipher takes a symbol (or a group of symbols) in the plaintext and
manipulate it in a systematic way to produce a different symbol (or group of
symbols), which becomes the ciphertext. The substituted symbols in the
ciphertext appear in exactly the same order as the original versions in the
plaintext.
• Transposition cipher ‘scrambles’ the order of the symbols in some systematic
way. The symbols remain unchanged between plaintext and ciphertext, but the
ordering of those symbols changes.
16) What will be the output of the XOR process if the 7-bit ASCII code for N (1001110) is
combined with the randomly generated coding data 0101010?
ASCII code 1 0 0 1 1 1 0
Random data 0 1 0 1 0 1 0
Output 1 1 0 0 1 0 0
17) One of the basic approaches to block encryption is the cipher-block chaining (CBC)
mode. Explain briefly this approach. Use diagrams to explain your idea.
In CBC mode an XOR process is used to combine the ciphertext output from one block
with the plaintext input of the following block. Using this method, every ciphertext block
is dependent on the ciphertext output from the preceding block as well as its own
plaintext input, so encryption of identical input blocks will produce different results. CBC
mode requires an additional extra input, known as an initialisation vector (IV), to the first
18) Mention five kinds of biometrics that can be used in security systems.
• Face, Fingerprint, Iris pattern, Voice, DNA, Gait (the way someone walks),
Signature (the way someone signs their name), Typing pattern (the way someone
logs in to their computer), Personal odour
19) A fingerprint is characterized by the ridge configurations. What are the ridge
configurations? At what levels these configurations can be analysed at?
• The ridge configurations: the way the ridge lines and the valleys between them are
arranged. The configuration of the ridge lines can be analysed at three different levels:
global, local and micro levels
20) You have studied two main sensor types for fingerprints scanning: optical and solid state.
Discuss the solid-state sensor by explaining the main idea behind its technology and how
it functions.
Solid-state sensors were originally designed with the aim of reducing the physical
size and cost of the sensors.
The idea was to build an all-in-one silicon chip with a two-dimensional sensory array
placed directly on the chip.
When providing a fingerprint image, users touch the sensing surface of the chip
directly.
Instead of converting optical patterns to electrical signals, solid-state sensors convert
thermal, capacitive, piezoelectric or electric field information to electrical signals.
Capacitive sensors are the most common type employed, because of their simplicity
and low cost.
21) You have studied in Block 4 the “Dutch machines” as one of the case studies that
discusses the acceptability of an electronic voting system. In 2006, a Dutch TV news
programme has questioned the security and reliability of these machines in the country’s
elections. Why did the Dutch government, electorate and media lose confidence in the
acceptability of the voting system in the wake of this programme? (Mention only four
reasons.) (12 marks)
• The machines were very old and insecure.
• Computer scientists from the campaign group managed to borrow a voting
computer from a local council and demonstrated it was possible to re-program the
computer to swap votes between parties and to inflate the number of votes
recorded in favour of the hypothetical Fraud party.
• The programme makers also claimed that, although access to the computers was
needed to perpetrate such fraud, the warehouse housing 400 of these machines
had very little physical security.
• In addition the 8000 voting machines used nationwide were regularly returned to
the factory for maintenance and the transportation of the machines was not subject
to any special security.
• The keys used to unlock the machines were all the same – one key would open all
8000.
• The security company responsible for testing the computers, allegedly only tested
one every four years and their reports on these tests were confidential; that is,
there is no public access to the reports.
• The computer scientists demonstrated it was possible with the aid of some
rudimentary wireless scanning equipment to remotely read how individual voters
were casting their votes. The computers leaked radio signals that could be picked
up by a scanner 25 metres away.
22) Write out the ciphertext resulting from encrypting the letter ‘s’ using the Caesar cipher
with a key of 12, using mathematical notation and evaluate the result. Use the grid shown
below to translate between alphabetic symbols and numerical values. (12 Marks)
s = 18. So when the key is 12, the calculation becomes: 18 + 12 mod 26.
23) Assume that the sender and the receiver have agreed to use a columnar transposition
cipher to encrypt their messages. Further, say that they agreed to use the codeword
“Tuesday”, and agreed that the transposition is to reverse the order of the letters of the
codeword and then swap pairs of letters, starting at the right-hand end. What will be the
ciphertext for the message: “Communication and information”? Detail your work.
(12 marks)
24) Two of the biometrics that can be used in security systems are the Fingerprint and the
Typing pattern. Give a brief explanation of each one. (12 Marks)
• Typing pattern (The way someone logs in to their computer): This is the way the keys
are pressed – the pressure with which each key is tapped, the intervals between key taps,
and so on – so is a behavioural biometric.
• It has the potential to replace signatures for computer-based activities, but study of this
biometric is still developing.
• Unlike the production of a signature, its capture does not require the subject’s
cooperation, as the computer can be set up to capture it automatically at login.