Quiz Slides
Quiz Slides
2
128 4 2 2 50
2 10 128 2 10 128!
8. RSA:
(a) Multiply two 300-digit numbers together, to obtain another number (it would
be about 600 digits)
(b) Divide a 1000-digit-long number by a 500-digit number, to obtain another
number (of about 500 digits)
(c) Factorise a 300-digit number that is known to be the product of two primes,
each of length 150 digits
(d) Factorise a 300-digit number that is known to be the product of two primes,
one of about 10 digits and the other one about 290 digits
(e) Convert a 1000-digit number from decimal notation into binary notation
(g) Compute x, given y = 2x mod 2n+1, where y and n are 300-digit numbers
11. WEP is a mechanism for encrypting wireless
networks that has been widely deployed since
about 2000. It was standardised in 1999 but it is
now considered insecure and is no longer
recommended. That is because:
(a) Suppose Bob has not made any observations yet, and tries to log
into Alice's account by guessing the two digits requested. (Suppose
also that Bob already knows Alice's account number and date of birth).
What is the probability that his guesses of the two digits is correct?
(b) Suppose Bob has made one observation of the credentials Alice
used to successfully log into her account, and now he tries to log in by
himself and is faced with a fresh request of two digits. Assume that he
enters the requested digit if he knows it, and otherwise makes a
random guess. What is the probability that he can enter them correctly?
(c) Suppose Bob has made two observations of the correct credentials.
What is the probability that he now knows all four digits of Alice's PIN?
13. Software written in Java resists buffer overflow
attacks more than software written in C because:
(a) If you transfer your contact numbers from one phone to another by Bluetooth, it
is possible that a laptop in the vicinity running rogue software could listen in and
obtain the contact numbers
(b) By using digital signatures, Microsoft Authenticode ensures that downloaded
code is bug-free and secure
(c) The closed padlock symbol in web browsers means that traffic between the
browser and the connected web server is encrypted
(d) Your Internet Service Provider such as BT is normally able to view the content
of your email
(e) Your Internet Service Provider such as BT is normally able to view the
credentials you use to log into your Internet bank account
(f) Your Internet Service Provider such as BT is normally able to view the URLs of
the websites that you visit
(g) A cookie is a type of malware that you get by visiting risky websites
(h) A denial of service attack is when malware changes your e-mail password and
you cannot access your e-mail any more
(i) If you disable cookies in your browser, you will get more spam
(j) If you disable cookies in your browser, you won't be able to log in to webmail
services like googlemail and hotmail
(k) Phishing is a kind of virus attack associated with Microsoft Office files
(l) An X.509 certificate shows that your copy of Windows is genuine
(m) A PGP key may be used to verify the digital signature attached to an e-mail
(n) A key certificate signed by a certificate authority enables your browser to verify
that it is connecting to your bank website and not some rogue website
(o) TOR is a system that enables you to surf the web with greater anonymity thanr
you usually have
(p) There are 400 million CCTV cameras in the UK
(q) If you have an enabled TPM chip in your computer it prevents you from
installing unlicensed software
(r) A rootkit is malware that can be blocked by a correctly configured firewall
(s) A buffer overflow attack is when someone sends you very large e-mails,
causing your e-mail account to get full up
(t) A code injection attack is when an attacker types some code fragment into a
web form, and the web server or database server inadvertently executes it
(u) Security through obscurity is the pratcice of obscuring a user's password with
stars or circles when the user types it in, so that no-one else can see it on the
screen
(v) Security theatre is a pejorative term used to describe security systems which
are mostly ineffective but are meant to impress users and customers