0% found this document useful (0 votes)
41 views3 pages

ECE CS Assignment

This document outlines an assignment for a fundamentals of information security course. It includes 4 questions testing students' knowledge of: [1] basic computer security concepts, encryption techniques, and number theory; [2] classical ciphers and cryptanalysis; [3] specifics of the Playfair cipher and one-time pad encryption. Students are expected to complete the assignment individually and submit answers via the Canvas online portal, with late submissions receiving a 15% per day penalty.

Uploaded by

uchitha.sk99
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views3 pages

ECE CS Assignment

This document outlines an assignment for a fundamentals of information security course. It includes 4 questions testing students' knowledge of: [1] basic computer security concepts, encryption techniques, and number theory; [2] classical ciphers and cryptanalysis; [3] specifics of the Playfair cipher and one-time pad encryption. Students are expected to complete the assignment individually and submit answers via the Canvas online portal, with late submissions receiving a 15% per day penalty.

Uploaded by

uchitha.sk99
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

ECE/CS 5560, Fundamentals of Information Security

ECE/CS 5560 - Assignment 1


Grading, submission and late policy:
- You are expected to complete this homework on your own (not with a partner)
- This assignment accounts for 5% of your final grade
- Standard late policy applies - Late penalty for this lab will be 15% for each day.
Submissions that are late by 2 days or more will not be accepted
- You will submit your answers via Canvas
- For all the algorithm design questions, you can use Sage, Python, or C to answer

1) True or False [15 points]

I. The three main computer security objects include: Confidentiality, Integrity, and
Accountability.

Answer:

II. Replay attack is one of active attacks.

Answer:

III. There are two specific authentication services: peer entity authentication and data
origin authentication.

Answer:

IV. (314, 85) are not relatively prime to each other.

Answer:

V. 89 ≡ -7 (mod 8)

Answer:
ECE/CS 5560, Fundamentals of Information Security

2) Multiple Choice [10 points]

I. For two servers (X&Y) with the same number of open ports in the same local
area network, server X’s open ports are well-known numbers like 80, server Y’s
open ports are random numbers. Compare the attack surface of server X is with
that of server Y.

A) X < Y B) X = Y
C) X > Y D) Depends on the data stored in the server.

II. __________ attacks exploit the characteristics of the algorithm to attempt to


deduce a specific plaintext or to deduce the key being used.

A) Eavesdropping B) Brute-force

C) Denial of Service D) Cryptanalytic

3) Basics of Number Theory [40 points]

I. [10 pts] Determine gcd(4675, 12055)

II. [10 pts] Use Fermat’s theorem to find 3201 mod 11.

III. [10 pts] Use Euler’s theorem to find a number a between 0 and 28 with a85
congruent to 6 mod 29.

IV. [10 pts] Find all primitive roots of 13.


ECE/CS 5560, Fundamentals of Information Security

4) Classical Ciphers & Cryptanalysis [35 points]

I. [5 pts] What are the two basic functions used in encryption algorithm?

Answer:

II. [10 pts] What is the difference between a mono-alphabetic cipher and a poly-
alphabetic cipher? Why is the mono-alphabetic cipher is less secure under
cryptanalysis attacks?

Answer:

III. [10 pts] In one Playfair cipher, its keyword is “SECURITY”, please translate the
plain- text “balloon” into its cipher-text (detail the translation procedure)

Answer:

IV. [10 pts] What are the two problems with one-time pad?

Answer:

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy