0% found this document useful (0 votes)
50 views4 pages

T318 MTA Summer2021 Key

The document provides instructions and questions for a mid-term exam on applied network security. It is divided into 3 parts testing multiple choice, short answer, and calculation questions. Part 1 contains 6 multiple choice questions worth 1 mark each. Part 2 contains 5 short answer questions worth 4 marks each. Part 3 contains 3 calculation or problem-solving questions worth between 3-6 marks each.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views4 pages

T318 MTA Summer2021 Key

The document provides instructions and questions for a mid-term exam on applied network security. It is divided into 3 parts testing multiple choice, short answer, and calculation questions. Part 1 contains 6 multiple choice questions worth 1 mark each. Part 2 contains 5 short answer questions worth 4 marks each. Part 3 contains 3 calculation or problem-solving questions worth between 3-6 marks each.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Faculty of Computer Studies

Course Code: T318


Course Title: Applied Network Security

Mid-term

Summer Semester

Date:10-Aug-2022

:Number of Exam Pages


)( :Time Allowed 2h
including this cover sheet((

Instructions:

 Total Marks: 40
 Total Number of Questions:
o Part 1: 6
o Part 2: 5
o Part 3: 3
 Marks Distribution:
o Part 1: 6 marks
o Part 2: 20 marks
o Part 3: 14 marks
 Write your answer in the answer booklets. Answers given on the exam paper will
not be marked.
 The use of electronic devices that could have a memory is NOT permitted
 Be sure you write your name and ID on the External Answer booklet.

T318 - MTA Page 1 of 4 Summer 2021-2022


Part 1: Multiple choices: For each question select the best answer (place the answer
on the external answer booklet) – Each question carries a WEIGHT OF 1 mark.
Total: 6 Marks
1. The opponent is most willing to recover______:
A. The Encryption key
B. The plaintext
C. The ciphertext
D. The Identity of the sender and/ or receiver
ANSWER: A
2. Cryptography systems can be divided into
A. Substitution and Transposition
B. Symmetric and Asymmetric
C. Block cipher and stream cipher
D. All are correct
ANSWER: D
3. The most difficult Attack scenario is
A. Ciphertext only
B. Known Plaintext
C. Chosen plaintext
D. chosen ciphertext
ANSWER: A
4. We can use Compression techniques to make the encryption more secure and difficult
to attack
A. True
B. False
ANSWER: A
5. Steganography is different from Encryption. Anyway, We use encryption in
Steganography process
A. True
B. False
ANSWER: A
6. Rotor Machines is an example of a multi stage Encryption
A. True
B. False
ANSWER: A

Part 2: Short questions:Answer the following questions – Each question carry a


WEIGHT OF 4 marks. Total: 20 Marks

1. Explain the avalanche effect. (4 Marks)


The avalanche effect is a property of any encryption algorithm such that a
small change in either the plaintext or the key produces a significant change
in the ciphertext.
2. List and briefly define categories of passive and active security attacks(4 Marks)
a. Passive attacks: release of message contents and traffic analysis.

T318 - MTA Page 2 of 4 Summer 2021-2022


b. Active attacks: masquerade, replay, modification of messages, and denial of
service
3. Define the three security goals. (4 Marks)
The three security goals are confidentiality, integrity, and availability.
a. Confidentiality means protecting confidential information.
b. Integrity means that changes to the information need to be done only by
authorized entities.
c. Availability means that information needs to be available to authorized
entities.
4. Distinguish between a substitution cipher and a transposition cipher(4 Marks)
a. In Substitution Cipher Technique plain text characters are replaced with
other characters, numbers and symbols as well as in substitution Cipher
Technique, character’s identity is changed while its position remains
unchanged. .(3 Marks)
b. Transposition Cipher Technique rearranges the position of the plain text’s
characters. In transposition Cipher Technique, The position of the character
is changed but character’s identity is not changed.
5. Connect the operations on the left with the correct description on the right for
Simplified AES: (4 Marks)

a. Nibble substitution 1 uses an exclusive OR on a round key


b The Shift Row 2 swaps the 2nd and 4th nibbles in the state
operation matrix.
c The Add Key 3 uses S-Boxes
operation
D The Mix column 4 uses Galois Field GF(24) arithmetic
operation

a. Nibble substitution: 3. uses S-Boxes 1 Marks)


b. The Shift Row operation: 2. swaps the 2nd and 4th nibbles in the state matrix. (1
Marks)
c. The Add Key operation: 1. uses an exclusive OR on a round key. (1 Marks)
d. The Mix column operation: 4. uses Galois Field GF(24) arithmetic. (1 Marks)

Part 3: Answer all of the following questions Total: 14 Marks

1. Determine the following(6 Marks)


a. φ (41) b. φ (27) c. φ (231) d. φ (440)
a. φ (41) = 40, because 41 is prime(1.5 Marks)
b. φ (27) = φ (33) = 33 – 32 = 27 – 9 = 18(1.5 Marks)
c. φ (231) = φ (3)  φ (7)  φ (11) = 2  6  10 = 120(1.5 Marks)
d. φ (440) = φ (23)  φ (5)  φ (11) = (23 – 22)  4  10 = 160(1.5 Marks)

T318 - MTA Page 3 of 4 Summer 2021-2022


2. Calculate the values for B, C, D, E and F in the diagram for S-DES encryption below,
where A = 10011101 and Key 1 = 01010000. You may use the information below the
diagram. (5 Marks)

 Expand/Permutation with 8 bit input, output bit order is: 4 1 2 3 2 3 4 1


 Permutation 2, output bit order is: 2 4 3 1

 Answer (B): 1100 (1 Mark)


 Answer (C): 1101 (1 Mark)
 Answer (D): 01 (1 Mark)
 Answer (E): 00 (1 Mark)
 Answer (F): 1000 (1 Mark)

3. Using this Playfair matrix:

Encrypt this message: (3 Marks)


“Must see you over Cadogan West. Coming at once”.

“UZTBDLGZPNNWLGTGTUEROVLDBDUHFPERHWQSRZ”

End of Questions

T318 - MTA Page 4 of 4 Summer 2021-2022

You might also like