Final Exam Review Exam time is May. 2nd 1:00pm – 3:50pm in the same classroom. All semester’s content will be tested, but more on content after midterm exam #2. What actually covered in the final exam: All questions in the 4 homework assignments and 2 quizzes will be covered. Questions/examples in previous two midterm review slides Questions/examples in this review slides.
You need to compute out the final numerical results in your answer You need to compute out the final numerical results in your answer. Do not simply write down the formula as your answer. You can bring a calculator (no computer, iPhone, etc) The numbers in exam are easy to comput
Question Types Knowledge questions True or false statement If false, explain why and give the correct statement Calculations
Knowledge Question Examples What are the two classes of cryptography? Which one is similar to shuffling poker card: Substitution cipher or transposition cipher? DES has fixed-size key while AES has options to choose several different sizes of key. What are the pros and cons for symmetric key crypto? Public key crypto? Two points: computation; key predistribution Meaning of “confidentiality”, “integrity”, “nonrepudation”, “authentication”. What are the two major hash functions in use? SHA-1 and MD5 Two different representation of “MAC”? Meaning? Media access control and message authentication code
Knowledge Question Examples Using the notation in ch31.ppt, what are the meaning of: H(m), KA-(H(m)), KCA-(KA+), KAB(m) Full name of SMTP, FTP, RR, TLD? What are the four types of DNS resource record? Service port for DNS, SMTP, HTTP, SSH, Telnet. SMTP basic commands for email compositing
Calculation Problem Examples Compute ciphertext using Cesar cipher, Vigenere cipher Compute ciphertext given transposition cipher key (ch30.ppt, P16-17) If Alice wants to send a message m to Bob confidentially and wants Bob be sure that it is from Alice, what message format should be? Assume Alice and Bob knows each other’s public key beforehand. What if only integrity is required? DNS setup and RRs for a new company (HW3)
Excluding Contents Packet fragmentation SNR and dB concepts and computation Shannon and Nyquist theories Stop-Wait ARQ and go-back-N ARQ CRC computation Checksum computation