CS351 - Final Exam

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/192

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:39 AM on 5/15/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

193 Terms

1
New cards

Password is something the individual ____.

knows

2
New cards

Physical key is something the individual _____.

possesses

3
New cards

Fingerprint is something the individual ______.

is

4
New cards

Handwriting is something the individual ________.

does

5
New cards

Where does Microsoft store user passwords?

SAM file

6
New cards

How does Kerberos differ from NTLM?

Kerberos uses tickets for authentication, allowing for mutual authentication, while NTLM relies on a challenge-response mechanism and does not provide mutual authentication.

7
New cards

What is user authentication?

The process of establishing confidence in user identities that are presented electronically to an information system

8
New cards

What are the basic security requirements?

1. Identify information system users

2. Authenticate the identities of those users

9
New cards

What are some examples of derived security requirements?

1. multifactor authentication

2. replay-resistant authentication

3. prevent reuse of identifiers for a period

4. disable identifiers after period of inactivity

5. enforce minimum password complexity

6. prohibit password reuse

7. allow temp password use for system logons

8. store and transmit only crypto-protected passwords

9. obscure feedback of authentication info

10
New cards

What does Microsoft use to store all users and their hash passwords?

SAM file

11
New cards

How are passwords hashed in a SAM file?

NTLM Authentication Process

12
New cards

What does kerberos authentication use?

A ticketing granting server (TGS)

13
New cards

What is a passive online attack? Provide an example.

Attacker performs password hacking without communicating with the authorized party

ex: wire sniffing, replay

14
New cards

What is an active online attack? Provide an example.

Attacker tries a list of passwords one by one

ex: hash injection, password guessing, phishing

15
New cards

What is an offline attack? Provide an example.

Attacker copies the target's password file and then tries to crack passwords in his own system

ex: pre-computed hashes, rainbow table

16
New cards

What is a non-electronic attack? Provide an example.

Attacker need not posses technical knowledge to crack password, hence known as non-technical attack

ex: shoulder surfing, social engineering, dumpster diving

17
New cards

What is the most accurate but costly form of password?

A. Hand

B. Signature

C. Retina

D. Iris

E. Finger

D. Iris

18
New cards

What is the least accurate but cheapest form of password?

A. Hand

B. Signature

C. Retina

D. Iris

E. Finger

B. Signature

19
New cards

What is a dictionary attack?

Develop a large dictionary of possible passwords and try each against the password file

20
New cards

What is a rainbow table attack?

Trying to discover a password from a hash by comparing it to a database of precomputed hashes

21
New cards

What are the drawbacks of memory cards?

1. Require special reader

2. Loss of token

3. User dissatisfaction for computer use

22
New cards

What is an example of where memory cards are used?

Hotel Room, ATMs

23
New cards

What is remote user authentication?

Authentication over a network, the internet, or communications link

24
New cards

What are the security threats in remote user authentication?

1. eavesdropping

2. replay

25
New cards

What is a Client attack?

Adversary attempts to achieve user authentication without access to the remote host or the intervening communications path

26
New cards

What is a host attack?

Directed at the user file at the host where passwords, token passcodes, or biometric templates are stored

27
New cards

What is the typical defense against client attack?

large entropy (too many possible values to guess)

28
New cards

What is the typical defense against replay attack?

challenge-response protocol

29
New cards

What is the block size used by AES?

128 bits

30
New cards

What key lengths does AES support?

128, 192, and 256 bits

31
New cards

What algorithm was selected for AES?

Rijndael Algorithm

32
New cards

How many rounds does the AES cipher perform?

10 rounds, with the first 9 rounds including all 4 stages and the 10th round including 3 stages

33
New cards

What are the four stages used in each round of AES?

Substitute Bytes, ShiftRows, MixColumns, AddRoundKey

<p>Substitute Bytes, ShiftRows, MixColumns, AddRoundKey</p>
34
New cards

What is the first stage of the AES cipher?

AddRoundKey

35
New cards

What transformation does the Substitute Byte stage use?

A 16 x 16 matrix of byte values called an S-box

<p>A 16 x 16 matrix of byte values called an S-box</p>
36
New cards

How does the ShiftRow transformation alter the rows?

The first row is unchanged, the second row shifts left by 1 byte, the third by 2 bytes, and the fourth by 3 bytes.

37
New cards

What does the MixColumns transformation do?

Operates on each column individually, mapping each byte of a column into a new value.

38
New cards

What is the purpose of the AES key expansion algorithm?

To create new keys from the original key for each round.

<p>To create new keys from the original key for each round.</p>
39
New cards

What is the first step in the key expansion process?

RotWord, which performs a one-byte circular left shift on a word.

40
New cards

What does the SubWord function do?

Performs a byte substitution on each byte of its input word using the S-box.

41
New cards

What is added to the result of SubWord in the key expansion?

A round constant, Rcon[j].

<p>A round constant, Rcon[j].</p>
42
New cards

What is the result of the multiplication in the MixColumn transformation?

The sum of products of elements of one row and one column.

43
New cards

What is the significance of the hexadecimal addition table in AES?

It is used for the addition of results during the MixColumns transformation.

<p>It is used for the addition of results during the MixColumns transformation.</p>
44
New cards

What happens to the first 4 bytes during key expansion?

They are shifted, substituted with the S-box, and XORed with a round dependent constant.

45
New cards

What does the term 'AddRoundKey' refer to in AES?

A stage where the round key is added to the state using XOR operation.

46
New cards

What is the final output of the AES encryption process?

The transformed state after the last round.

47
New cards

What is the main purpose of AES?

To provide a secure encryption standard to replace 3DES.

48
New cards

What is the primary difference between block ciphers and stream ciphers?

Block ciphers process messages in blocks, while stream ciphers process messages one bit or byte at a time.

49
New cards

What is the purpose of the Feistel structure in block ciphers?

It partitions the input block into two halves and processes them through multiple rounds with substitutions and permutations.

<p>It partitions the input block into two halves and processes them through multiple rounds with substitutions and permutations.</p>
50
New cards

What are the key factors that contribute to the security of a Feistel cipher?

Block size, key size, number of rounds, subkey generation algorithm, and speed of encryption/decryption.

51
New cards

What does DES stand for?

Data Encryption Standard

52
New cards

What is the block size used in DES?

64 bits

53
New cards

What is the key length used in DES?

56 bits

54
New cards

Describe the initial permutation (IP) in DES.

The initial permutation reorders the input data bits, distributing even bits to the left half and odd bits to the right half.

55
New cards

What is the function of the E-box in DES?

The E-box expands the 32-bit input to 48 bits, changing the order of bits and repeating certain bits.

<p>The E-box expands the 32-bit input to 48 bits, changing the order of bits and repeating certain bits.</p>
56
New cards

How many S-boxes are used in DES and what is their function?

Eight S-boxes are used to map 6 bits to 4 bits, providing substitution based on input bits.

57
New cards

What is the output of the S-box operation in DES?

The output is a 32-bit result after processing through all eight S-boxes.

58
New cards

What is the role of the P-box in DES?

The P-box performs a permutation on the output from the S-boxes, ensuring no bits are reused or ignored.

59
New cards

What is the key schedule in DES?

The key schedule forms subkeys for each round, involving initial permutation and rotations of key halves.

60
New cards

What is the brute force attack time estimated for breaking DES with a 56-bit key?

Approximately 1000 years.

61
New cards

What are the proposed solutions to enhance the security of DES?

Double DES and Triple DES.

62
New cards

What is the Electronic Codebook (ECB) mode?

A mode where messages are divided into independent blocks, each encrypted separately.

63
New cards

How does Cipher Block Chaining (CBC) mode work?

In CBC mode, each plaintext block is chained with the previous ciphertext block, using an initial vector (IV).

<p>In CBC mode, each plaintext block is chained with the previous ciphertext block, using an initial vector (IV).</p>
64
New cards

What is the main feature of Cipher Feedback (CFB) mode?

CFB treats the message as a stream of bits, feeding back the output of the block cipher for the next stage.

65
New cards

What distinguishes Output Feedback (OFB) mode from other modes?

OFB mode allows the output of the cipher to be computed in advance and is independent of the message.

66
New cards

What is the Counter Mode (CTR) in encryption?

CTR mode encrypts a counter value instead of feedback, requiring a unique key and counter for each plaintext block.

67
New cards

What is the significance of the Avalanche effect in cryptography?

The Avalanche effect ensures that a small change in input results in a significant change in output, enhancing security.

68
New cards

What is the relationship between the number of rounds in a Feistel cipher and its security?

More rounds generally increase security by making cryptanalysis more difficult.

69
New cards

What is the function of the subkey generation algorithm in DES?

It generates subkeys for each round, contributing to the overall complexity and security of the cipher.

70
New cards

What is the expected time to break DES using dedicated hardware, as demonstrated in 1998?

It took about 3 days.

71
New cards

What is the main advantage of using larger block sizes in block ciphers?

Larger block sizes generally provide greater security.

72
New cards

What does the term 'autoclaving' refer to in the context of S-boxes?

Autoclaving refers to the feature where row selection in S-boxes depends on both the data and the key.

73
New cards

What is the output of the DES encryption process after one complete round?

The output consists of the left and right halves after applying the round function and permutations.

74
New cards

How does the initial permutation affect the input data in DES?

It reorders the bits, distributing them into left and right halves for further processing.

75
New cards

What are the two main components of cryptography?

Encryption and Authentication & Integrity.

76
New cards

What does authentication ensure in cryptography?

That users of data/resources are who they claim to be and that a message has not been altered.

77
New cards

Name the categories of classical substitution ciphers.

Monoalphabetic, Polyalphabetic, Homophonic, and Polygram Ciphers.

78
New cards

What is a Monoalphabetic Substitution Cipher?

A cipher where each letter in the plaintext is replaced by a letter with a fixed relationship.

<p>A cipher where each letter in the plaintext is replaced by a letter with a fixed relationship.</p>
79
New cards

How does the Caesar Cipher work?

CT = E(pt, k) = (pt + k) mod 26 for encryption and PT = D(CT, k) = (CT - k) mod 26 for decryption.

80
New cards

What many tries are needed to decrypt caesar cipher?

25

81
New cards

What is a reciprocal cipher?

A cipher where if x -> Y, then y -> X, with the same procedure for encryption and decryption.

82
New cards

How many tries will it take to brute force Reciprocal Cipher?

25 x 23 x 21 x 19 ....

83
New cards

How many tries will it take to brute force a Random Cipher?

26!

84
New cards

What is a Polygram Cipher?

A cipher that performs multi-element encryption instead of element-by-element encryption.

85
New cards

How does the Playfair Cipher encrypt plaintext?

By constructing a 5x5 matrix and encrypting plaintext digrams according to specific rules.

86
New cards

What are polyalphabetic ciphers?

A PT letter maps to multiple CT letters

87
New cards

What is the Vigenere Cipher?

A polyalphabetic cipher that uses multiple monoalphabetic substitutions defined by a key.

88
New cards

What is the Vernam Cipher?

Choose a keyword that is as long as plaintext and has no statistical relationship to it

89
New cards

What is the One-Time Pad?

A polyalphabetic cipher that uses a random key as long as the message with no repetitions.

90
New cards

What is a classical transposition cipher?

A cipher that hides the message by rearranging the letter order without altering the actual letters.

91
New cards

How does the Railfence Cipher work?

Plaintext is written down as a sequence of diagonals and read off as a sequence of rows.

92
New cards

What is a Row Transposition Cipher?

A cipher where the message is written row-wise and read column-wise in a specific order.

93
New cards

What is the main problem with the One-Time Pad?

Generating large quantities of random keys and secure key distribution and storage.

94
New cards

What is the significance of the keyword in the Playfair Cipher?

It is used to fill the 5x5 matrix and determine the encryption of plaintext digrams.

95
New cards

What is the difference between symmetric and asymmetric encryption?

A symmetric encryption uses the same key for encryption as it does for decryption.

An asymmetric key uses different encryption keys for encryption and decryption.

96
New cards

What is the challenge of finding security weaknesses?

Attackers only need to find a single weakness, while the designer must eliminate all weaknesses for perfect security.

97
New cards

What are the key components of incident response for information systems?

Preparation, detection, analysis, containment, recovery, and reporting of incidents.

98
New cards

What are the categories of attack surfaces?

Network, software, and human attack surfaces.

99
New cards

Which organization deals with measurement science and standards in the U.S.?

National Institute of Standards and Technology (NIST).

100
New cards

What is the role of the Internet Society (ISOC)?

To provide leadership on issues affecting the future of the Internet.