Kingdom of Saudi Arabia
المملكة العربية السعودية
Ministry of Education
وزارة التعليم
Umm AlQura University
جامعة أم القرى
Adham University College
الكلية الجامعية بأضم
Computer Science Department
قسم الحاسب اآلل
Summer Semester of 2018 Academic Year
Computer Security Systems Course, 6803532-3
Home-work
Last Delivery Date: Monday, 09 / 07 / 2018 – 25 / 10 / 1439 H
Question One: 2 Marks
Choose the best answer:
[Link]’s the best technique that can be used to prevent a worm software from accessing to a
Network?
a) Gatekeeper function
b) Screening logic
c) Internal security controls
d) None of them
[Link] one of the following algorithms processes the data as blocks instead of streams?
a) Feistel cipher
b) Rijndael cipher
c) RC4
d) a and c
[Link] the analysis result of a patient from getting modified or corrupted in a Hospital system
is preserving the confidentiality.
a) True
b) False
[Link]’s better to make the cipher easy to analyze.
a) True
b) False
1
Kingdom of Saudi Arabia
المملكة العربية السعودية
Ministry of Education
وزارة التعليم
Umm AlQura University
جامعة أم القرى
Adham University College
الكلية الجامعية بأضم
Computer Science Department
قسم الحاسب اآلل
Question Two: 3 Marks
Consider a Social Media website such as Facebook, in which the user can create an account, add posts, add
friends, create groups, create pages, and follow pages, etc.
a. Give examples of confidentiality, integrity, and availability requirements associated with the website.
b. In each case, indicate the degree of importance of the requirement.
Question Three: 1 Marks
Determine in each one of the following situations if the attack is Active or Passive, if Active determine which
type of Active attacks, and if Passive determine which type of passive attacks.
a. Lama has found the password of Reham’s email written on one of her school’s textbooks, since that time
Lama has been reading Reham’s new and sent mails but with no corruptions or modifications.
b. Ali has hacked a University system and prevented Nasser from reaching to his Academic Record to see his
GPA.
Question Four: 2 Marks
Consider a very simple symmetric block encryption algorithm in which 64-bits blocks of plaintext are
encrypted using a 128-bit key. Decryption equation is defined as
𝐏 = (𝐂 ⊞ −𝐊𝟏)⨁ 𝐊𝟎
where P = plaintext, K = secret key, K0 = leftmost 64 bits of K, K1 = rightmost bits of K, ⨁ = bitwise exclusive
OR, and ⊞ = is addition mod 264.
a. Show the encryption equation. That is, show the equation for C as a function of P, K0, and K1.
Explain your answer.
Question Five: 2 Marks
Consider a Stream cipher and the next byte generated by the key generator is 11000001 and the next
plaintext byte is 10000011.
-Show the encryption and decryption operations.
2
Kingdom of Saudi Arabia
المملكة العربية السعودية
Ministry of Education
وزارة التعليم
Umm AlQura University
جامعة أم القرى
Adham University College
الكلية الجامعية بأضم
Computer Science Department
قسم الحاسب اآلل
Question Six: 1 (Bonus)
With the ECB mode, if there is an error in a block of the transmitted ciphertext, only the corresponding
plaintext block is affected. However, in the CBC mode, this error propagates.
For example, an error in the transmitted C1 (Following Figure) obviously corrupts P1 and P2.
a. Are any blocks beyond P2 affected?
b. Suppose that there is a bit error in the source version of P1. Through how many ciphertext blocks is this
error propagated? What is the effect at the receiver?
c. Is it possible to perform encryptions operation in parallel on multiple blocks of plaintext in the CBC mode?
How about decryption?
d. Suppose there is an error in a block of ciphertext on transmission using CBC, with reference to the Figure
given above. What effect is produced on the recovered plaintext blocks?
Remember, “Success is 1% inspiration and 99% perspiration” 😉
If you have any questions, feel free to ask me through my email
[Link] Sami Ahmed Khayat
Teacher Assistant @ Adam University College
mskhayat@[Link]