ECE CS Assignment
ECE CS Assignment
I. The three main computer security objects include: Confidentiality, Integrity, and
Accountability.
Answer:
Answer:
III. There are two specific authentication services: peer entity authentication and data
origin authentication.
Answer:
Answer:
V. 89 ≡ -7 (mod 8)
Answer:
ECE/CS 5560, Fundamentals of Information Security
I. For two servers (X&Y) with the same number of open ports in the same local
area network, server X’s open ports are well-known numbers like 80, server Y’s
open ports are random numbers. Compare the attack surface of server X is with
that of server Y.
A) X < Y B) X = Y
C) X > Y D) Depends on the data stored in the server.
A) Eavesdropping B) Brute-force
II. [10 pts] Use Fermat’s theorem to find 3201 mod 11.
III. [10 pts] Use Euler’s theorem to find a number a between 0 and 28 with a85
congruent to 6 mod 29.
I. [5 pts] What are the two basic functions used in encryption algorithm?
Answer:
II. [10 pts] What is the difference between a mono-alphabetic cipher and a poly-
alphabetic cipher? Why is the mono-alphabetic cipher is less secure under
cryptanalysis attacks?
Answer:
III. [10 pts] In one Playfair cipher, its keyword is “SECURITY”, please translate the
plain- text “balloon” into its cipher-text (detail the translation procedure)
Answer:
IV. [10 pts] What are the two problems with one-time pad?
Answer: