EEC 688/788 Secure and Dependable Computing Discussion#1 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org
Administrative Next Tuesday’s class (9/29) is canceled – I will attend a workshop at OAI Midterm this Thursday (9/24) Hand written cheat sheet (US Letter size) allowed No smart phone please TI-83, TI-84 calculator or equivalent allowed Volunteers needed for a human subject test for my research 1% extra credit will be award Each test will take no more than 2 minutes Unfortunately you will have to wait for your turn Today: 4-5pm, and 8-9pm
Q1. Assuming that the DES block cipher is used in the Electronic Code Book mode. If one bit in a block of ciphertext is inverted during transmission, how many bits will likely be damaged after decryption at the receiver? 8/19/2019 8/19/2019 EEC693: Secure and Dependable Computing EEC688: Secure & Dependable Computing Wenbing Zhao
Q2. Assuming that the DES block cipher is used in the Cipher Block Chaining mode. If one bit of ciphertext is inverted during transmission, how many bits will likely be damaged after decryption at the receiver? 8/19/2019 8/19/2019 EEC693: Secure and Dependable Computing EEC688: Secure & Dependable Computing Wenbing Zhao 4
Q3. Assuming that the DES block cipher is used in the Cipher Feedback mode. If one bit of ciphertext is inverted during transmission, how many bits will likely be damaged after decryption at the receiver (for both variations)? 8/19/2019 8/19/2019 EEC693: Secure and Dependable Computing EEC688: Secure & Dependable Computing Wenbing Zhao 5
Q4. Assuming that the DES block cipher is used in the Stream Cipher mode (it is also called output feedback mode). If one bit of ciphertext is inverted during transmission, how many bits will likely be damaged after decryption at the receiver? 8/19/2019 8/19/2019 EEC693: Secure and Dependable Computing EEC688: Secure & Dependable Computing Wenbing Zhao
EEC688: Secure & Dependable Computing Q5. Recall that the following authentication protocol is vulnerable to the reflection attack. Make one change to the protocol so that it is no longer vulnerable to the reflection attack. Software control will be elaborated in more details in the next slide 8/19/2019 EEC688: Secure & Dependable Computing Wenbing Zhao 7
EEC688: Secure & Dependable Computing Q6. Considering the following way of producing a digital signature using message digests. If the one-way hash function used is not robust and one can easily find the collision on the hash. Which requirement (or requirements) of the digital signature would be violated? Software control will be elaborated in more details in the next slide 8/19/2019 EEC688: Secure & Dependable Computing Wenbing Zhao 8
EEC688: Secure & Dependable Computing Q7. Design an efficient secure email mechanism based on public key cryptography. Software control will be elaborated in more details in the next slide 8/19/2019 EEC688: Secure & Dependable Computing Wenbing Zhao 9