0% found this document useful (0 votes)
94 views6 pages

IT342 - Final - Exam - Fall - 2019-2020

This document contains a final exam for a data security course, with 6 multiple choice and essay questions covering topics like encryption modes, cryptographic algorithms, key exchange protocols and digital signatures. Students are asked to identify true statements about block cipher modes like CBC and CTR, define cryptographic terms, perform encryption using RSA with given parameters, encrypt a message securely using one of two unknown schemes, and suggest solutions to security issues in information exchange at a company.

Uploaded by

yosra so
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
94 views6 pages

IT342 - Final - Exam - Fall - 2019-2020

This document contains a final exam for a data security course, with 6 multiple choice and essay questions covering topics like encryption modes, cryptographic algorithms, key exchange protocols and digital signatures. Students are asked to identify true statements about block cipher modes like CBC and CTR, define cryptographic terms, perform encryption using RSA with given parameters, encrypt a message securely using one of two unknown schemes, and suggest solutions to security issues in information exchange at a company.

Uploaded by

yosra so
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

University Of Benghazi

Faculty of Information Technology

IT342 Data Security Instructor: Dr. Mohamed Alkalai

Final Exam (60 Marks) Date: 11. 01. 2020

Student's Name: …................................................. Student's ID: …...............................

Question 1 (10 Marks): Choose the correct answer of the following sentences:

1. Which of the following statements are true?

i) In the CBC mode, the plaintext block is XORed with previous ciphertext block
before encryption.
ii) The CTR mode does not require an Initialization Vector
iii) The last block in the CBC mode uses an Initialization Vector
iv) In CBC mode repetitions in plaintext do not show up in ciphertext

a. iii) b ii) and iv) c. All the Statements are true d. i) ii) and iv)

2. A substitution cipher replaces one symbol with

a. same symbol b. provide two symbols for each c. another d. All of them

3. Cryptography, a word with Greek origins, means

a. Corrupting Data b. Secret Writing c. Open Writing d. Closed Writing

4. Encryption standard that is selected by the US government to replace DES.

a. AES b. BES c. CES d. DES

5. For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where PT message=8
and thus find the CT.

a) 23 b) 64 c) 134 d) 54
Question 2 (6 marks): Calculate the values for B, C, D, E and F in the diagram for S-
DES encryption below, where A = 11011000 and K1 = 01010000. You may use the
information below the diagram.

Here what you need to complete this task.

E/P P4
4 1 2 3 2 3 4 1 2 4 3 1

1 0 3 2 0 1 2 3
S0 = 3 2 1 0 S1= 2 0 1 3
0 2 1 3 3 0 1 0
3 1 3 2 2 1 0 3

E/P
A
+ K1

B C

S0 S1

D E
P4

F
Question 3 (9 marks): You have two encryption schemes, which are designed to encrypt
messages of n bits, where n ≥ 1 is some fixed integer. You know that only one of the two
schemes is provably secure (IND-CPA) under some well-studied assumption, but you
don’t know which one. Describe how will you encrypt an n-bit message securely (IND-
CPA). Try to come up with the most efficient scheme. Justify security of your approach.
You don’t have to give a formal proof, but try to come up with a convincing argument.
Question 4 (10 Marks): Answer the questions below regarding key generation with
Diffie-Hellman and RSA.

(a) Perform encryption and decryption using the RSA algorithm, p=17, q=31, e=7,
m=2.

(b) User A and B exchange the key using Diffie-Hellman algorithm. q=11 X A=2 XB=3.
Find the value of YA , YB and k?

(c) What is an RSA signature for a message m = 4? Assume the following RSA
parameters: a private exponent d = 17 and a composite n = 21.
Question 5 (10 Marks): Complete the following sentences:

1. Specify the four categories of security threads? ---------------------, ------------------------,

-------------------------, --------------------------

2. ----------------------- is a process of attempting to discover the key or plaintext or both.

3. Give the five modes of operation of Block cipher --------, --------, --------, --------, -------

4. Triple Encryption is a technique in which encryption algorithm is performed

–------------ times using –------------ keys.

5. The principle attraction of ECC compared to RSA, is that it appears to offer equal

security for a far –---------------- key size.

6. A digital signature need a -----------------------------------------

7. RSA is a well-known –------------- key cipher, whereas AES (Advanced Encryption

Standard) is a well-known –--------------- key cipher. Both ciphers are block ciphers.

8. Alice has a message to send to Bob and she wants to encrypt the message using

public-key cryptography so that no one other than Bob can read it, she does so by

using –---------------------------.
Question 6 (15 marks): Considering the following scenario, a company has some security
issues when their staff exchange electronic information. These problems are enumerated
in the following points:

1. Some important information might be compromised as a result of exchanging them in


a intelligible form.

2. Members can not be sure that the income information reach them without any change
(as they sent).

3. There is no way for the staff to identify the party who sent them the information.

Build a cipher system that sort out the problems stated above.

You might also like