Question

In: Computer Science

QUESTION 26 Consider RSA with p = 7 and q = 11. What are n and...

QUESTION 26

  1. Consider RSA with p = 7 and q = 11. What are n and z?

    n

    z

4 points   

QUESTION 27

  1. Put the following wireless encryption protocols in order from most secure to least secure.

          -       1.       2.       3.         

    WPA


          -       1.       2.       3.         

    WEP


          -       1.       2.       3.         

    WPA2

4 points   

QUESTION 28

  1. Alice wants to send an email message m to Bob and ensure confidentiality, authentication, and integrity. So, Alice sends the following to Bob:

    KB+ ( KS) + KS (m + KA- (H(m)))

    where KB+ is Bob's public key, KA- is Alice's private key,and KS is their shared session key.

    What is the first thing that Bob has to do to start unpacking this message?

    a. apply Bob's private key to the first part of the message to obtain the shared session key
    b. apply the shared session key to the 2nd part of the message to obtain the message and signed hash of the message
    c. apply Bob's public key to the first part of the message to obtain the shared session key
    d. apply Alice's public key to the first part of the message to obtain the shared session key

4 points   

QUESTION 29

  1. Select all of the ways that can help prevent SQL injection attacks.

    a. ensuring that all data from web forms is in lowercase
    b. ensuring that web forms do not rely on SQL databases
    c. properly validating input into web forms
    d. preventing data from web forms from directly modifying SQL statements

4 points   

QUESTION 30

  1. The basic idea behind DNSSEC is

    a. authenticating that the data received in a DNS response is the same as what was entered by the zone administrator (i.e., the response has not been tampered with)
    b. ensuring that only local authoritative nameservers have the authorization to contact nameservers higher in the hierarchy (i.e., TLD nameservers, root nameservers)
    c. encrypting each DNS response so that it cannot be read by a third-party
    d. providing name resolution from a hostname to an IP address

4 points   

QUESTION 31

  1. Consider the ACL shown below

    action src addr dst addr protocol src port dst port flag bit
    allow 222.22/16 outside of 222.22/16 TCP >1023 80 any
    allow outside of 222.22/16 222.22/16 TCP 80 >1023 ACK
    deny all all all all all all

    Select all of the types of traffic (application-layer protocols) that are allowed.

    a. HTTP
    b. FTP
    c. SMTP
    d. DNS

4 points   

QUESTION 32

  1. What is the disadvantage of traditional packet filters that stateful packet filters address?

    a. Traditional packet filters consider packets in isolation and do not consider if they are part of an existing connection.
    b. Traditional packet filters cannot specify TCP flags such as ACK, SYN, FIN.
    c. Traditional packet filters cannot distinguish between TCP and UDP packets.

4 points   

QUESTION 33

  1. Select all of the following that are disadvantages of signature-based IDS.

    a.

    They cannot do deep packet inspection.

    b.

    They may be overwhelmed because every packet must be compared with a large collection of signatures.

    c.

    They require previous knowledge of the attack to generate an accurate signature.

    d.

    They rely on determining if packet streams are statistically unusual, which is difficult.

    e.

    They may generate many false alarms because even though the signature matches, it may not be the result of an attack.

Solutions

Expert Solution

Question :: 26

p = 7 , q = 11

n = p x q ----> 7 x 11 = 77
z = ( p - 1 ) x ( q - 1 ) ----> 6 x 10 = 60

Question :: 27

Most Secure to Least Secure ::

WPA2 :: Advanced version of WPA. It uses AES ( Advanced Encryption Standard ) for encryption

WPA :: This encryption protocol uses Temporal Key Integrity Protocol for encryption.

WEP :: This encryption protocol is for wireless networks and It can easily broken

Question :: 28

What is the first thing that Bob has to do to start unpacking this message?

(b) :: apply the shared session key to the 2nd part of the message to obtain the message and signed hash of the message.

Question :: 29

(b) :: ensuring that web forms do not rely on SQL databases

(c) :: properly validating input into web forms // Validating the inputs in the web forms prevent the attacker to get into database with those false requests.

(d) :: preventing data from web forms from directly modifying SQL statements // data from web forms should not be passed to SQL statements on form submissions.

Question :: 30

(a) :: DNSSEC authenticates the data that is received.

Question :: 31

HTTP is allowed on port 80
FTP is allowed on ports greater than or equal to 1024.

Question :: 33

(b) :: Every packet need to checked which results in waste of time.

(c) :: Previous information about the attack need to be known to know the signature accurately which is very time consuming.

(e) :: false alarm will be generated extensively while performing checking.


Related Solutions

Consider an RSA system with p = 7109 and q = 7919. Generate a public and...
Consider an RSA system with p = 7109 and q = 7919. Generate a public and private key pair based on the given p and q. Show the STEPS
Write C program for RSA encryption and decryptin, where: p = 11,q = 5, e =...
Write C program for RSA encryption and decryptin, where: p = 11,q = 5, e = 7
Computer Security Sara is using RSA crypto-system with the following setup: p = 11 and q...
Computer Security Sara is using RSA crypto-system with the following setup: p = 11 and q = 3. Sara publish his Public Key: (n, e) = (33, 3). a. Find n, Ф(n). b. Calculate Sara’s private key. c. Nora wants to send the message M = 13 to Sara. Using Sara’s public and private keys, calculate the ciphertext C, and the value for Message R, when Sara recovers the message. d. Deem wants to set up his own public and...
Show that if P;Q are projections such that R(P) = R(Q) and N(P) = N(Q), then...
Show that if P;Q are projections such that R(P) = R(Q) and N(P) = N(Q), then P = Q.
give a constructive proof of fn = Q^n + P^n/ Q - P , where Q...
give a constructive proof of fn = Q^n + P^n/ Q - P , where Q is the positive root and P is negative root of x^2 - x - 1= 0 fn is nth term of fibonacci sequence, f1 = 1 f2, f3 = f2 +f1, ... fn= fn_1 +fn_2 , n>2
A commodity has a demand of Q = 26 - P, and a supply of Q...
A commodity has a demand of Q = 26 - P, and a supply of Q = -2 + P. 1. Draw a graph that shows the market equilibrium for each of the following cases: A. a competitive market B. a monopolist sells the product to consumers C. a monopsonist purchases the product from producers. Please label clearly all the curves that you draw, and the prices and quantities for each of the three cases. [Insert images of the three...
Assume p = 13, q = 7, e = 11 and message m = 46. 1)...
Assume p = 13, q = 7, e = 11 and message m = 46. 1) Can given e be suitable for public key? Give reason why. 2) Find d = e-1 if e is suitable. 3) Perform encryption on the message m using RSA algorithm. 4)Perform decryption on the ciphertext c = 56 using the RSA algorithm. 5) is c = 56, the ciphertext for the message m = 46?
Consider the following. 21, 11, 5, 26, 7, 4 Compute the population standard deviation of the...
Consider the following. 21, 11, 5, 26, 7, 4 Compute the population standard deviation of the numbers. (Round your answer to two decimal place.) _____________ (a) Double each of your original numbers and compute the standard deviation of this new population. (Round your answer to two decimal place.) ___________ (b) Use the results of part (a) and inductive reasoning to state what happens to the standard deviation of a population when each data item is multiplied by a positive constant...
Part 1: Encrypt the message CINEMA using RSA with n = 17 * 11 and e...
Part 1: Encrypt the message CINEMA using RSA with n = 17 * 11 and e = 13, use A =10...Z = 35, work in blocks of one letter each. Part 2: Decrypt the message 088-164-051-164-021-074 using the same parameters from part 1.
RSA: Alice wishes to send Bob the message POET. Suppose Bob chooses P = 29, Q...
RSA: Alice wishes to send Bob the message POET. Suppose Bob chooses P = 29, Q = 31, E = 47, and D = 143. Show the steps that Alice uses to encrypt the message POET (use the ascii values of the letters P, O, E, and T), and how Bob decrypts the message he receives from Alice. You will be generating very large numbers, and will find the following calculator helpful: https://www.calculator.net/big-number-calculator.html
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT