CSE3482_FinalExam_Winter2024_solutions
CSE3482_FinalExam_Winter2024_solutions
Final Examination
April 15, 2024
Instructions:
Question Points
1 / 8
FIRST NAME: _______________________ 2 / 16
3 / 25
LAST NAME: _______________________
4 / 20
5 / 11
STUDENT #: _______________________
6 / 20
Total / 100
1
1. Classical Cryptography [8 points]
1.1 Rail Fence Cipher [3 points]
Which of the following statements pertaining to Rail Fence Cipher are correct?
a) Rail Fence Cipher is a complex substitution cipher.
b) Rail Fence Cipher is sensitive to statistical (frequency analysis) attacks.
c) Under certain conditions, Rail Fence Cipher can achieve 100% transposition (every
plaintext character acquires a different position in the respective ciphertext).
d) None of the above is correct. First character in the
plaintext always remains
the first character in the
ciphertext
1.2 Vigenere Cipher [5 points]
Decrypt the below ciphertext using Vigenere Cipher and keyword STRIKE.
cyphertext: j x j w v y l b f v
cyphertext: j x j w v y l b f v
R E S O L U T I O N
2
2. Modern Cryptography [16 points]
2.1 Confusion vs. Diffusion [6 points]
Correctly complete the below sentences by using one of the two words:
‘confusion’ or ‘diffusion’.
confusion
A. One aim of _______________ is to make it very hard to find the encryption key even if
one has a large number of plaintext-ciphertext pairs produced with the same key.
diffusion
B. _______________ means that changing a single character of the input will change many
characteristics of the output.
confusion
C. Stream ciphers deploy only _______________.
3
2.3 TLS Symmetric Key Establishment [3 points]
In class we talked about the following two approaches by which TLS 1.2 protocol facilitates the
establishment of a symmetric key between a Web Client and a Web Server. Those are:
Approach 1: Client and Server deploy/run the Diffie-Helman algorithm, OR
Approach 2: Server sends its digital certificate to Client after which Client generates the
symmetric key and sends it (back) to Server encrypted with Server’s public (RSA) key.
Which of these approaches is not considered safe any longer and has been omitted from the
latest version of TLS protocol (TLS 1.3)?
a) Approach 1
b) Approach 2
Input Matrix
Substitution Matrix
https://www.researchgate.net/figure/SubBytes-transformation_fig13_51548979
https://www.redalyc.org/journal/5122/512253718012/html/
Output Matrix
4
3. Password Management & Attacks [25 points]
3.1 NIST Password Recommendations [6 points]
As discussed in class, NIST has recently published/updated a special publication on password
guidelines, which serves as the foundation for best password management practices across
many industries. For each of the bellow statements specify whether they are in line with the
NIST recommendations or not. (If they are in line with the NIST recommendations circle ‘yes’,
otherwise circle ‘no’.)
A) [2 points] Passwords should regularly expire (e.g., every 6 months) forcing users to replace
old passwords.
• Yes
• No
B) [2 points] Password management tools/policies should enforce users to deploy a diverse set
of characters (e.g., special characters, numbers, uppercase letters) when setting up new
passwords.
• Yes
• No
C) [2 points] Two-factor authentication systems should generally avoid the use of SMS codes
(sent to users’ phones) as one of the authentication factors.
• Yes
• No
Solution
Let L=letter, N=number.
Password pattern: LNLNLNLN
# of passwords: 26 × 10 × 25 × 9 × 24 × 8 × 23 × 7 = 26 × 25 × 24 × 23 × 10 × 9 × 8 × 7
# of passwords: 26 × 25 × 24 × 23 × 10 × 9 × 8 × 7 = 1,808,352,000
Note: if we assume that passwords could start with a number (which is not explicitly
stated in the question), then the number of valid passwords is 2 x 1,808,352,000 .
5
3.3 Passwords in Shadow File [7 points]
The following shows a partial output (i.e., partial information pertaining to 3 users – steve,
cholwich, thanaruk) of the /etc/shadow file on a Linux operating system.
A) [2 points] Is the same hashing algorithm used to calculate the hashes of all three user
passwords?
• Yes
• No
B) [2 points] Is the same salt value used to calculate the hashes of (i.e., be combined with) all
three user passwords?
• Yes
• No
C) [3 points] Can you tell which user has the longest password? Justify your answer in the
space provided below.
• Yes
• No
6
https://sandilands.info/sgordon/teaching/its335y13s2/protected/its335y13s2e01-midterm-exam-
answers.pdf
Now, consider a system that uses a hash function H() for the purposes of password hashing.
a) If the goal of the system is to be strongly effective against offline password cracking attacks,
which of the three properties H() should absolutely satisfy? (I.e., which property is more
important than the others.) Circle the correct answer.
• Collision Resistance
• Preimage Resistance
• Second Preimage Resistance
https://assets.cs161.org/exams/sp20/sp20mt2solutions.pdf
b) If the goal of the system is to be strongly effective against online password cracking attacks,
which of the three properties H() should absolutely satisfy? (I.e., which property is more
important than the others.) Circle the correct answer.
• Collision Resistance
• Preimage Resistance
• Second Preimage Resistance
7
4. Biometrics [20 points]
4.1 Choosing Best Biometrics System [6 points]
In class we have defined the following four performance parameters of a biometrics system:
Which of the six systems should the company opt for, if their objective is strong (i.e., reliable)
authentication?
a) system A
b) system B
c) system C
d) system D
e) system E
f) system F
8
a) Curve 1 represents the TPR and Curve 2 represents the FPR of a biometric system.
b) Curve 1 represents the TNR and Curve 2 represents the FNR of a biometric system.
c) Curve 1 represents the FPR and Curve 2 represents the FNR of a biometric system.
d) None of the above
https://www.researchgate.net/figure/False-Positive-and-False-Negative-ratios-versus-decision-
threshold_fig2_267764308
Solution
Y=T-5
X= 8-T
0.125 × X = 0.2 × Y
9
0.125 × (8-T) = 0.2 × (T-5) / multiply by 8
8 – T = 1.6 T – 8
16 = 2.6 T
T = 20 / 2.6 = 6.15
10
5. Access Control [11 points]
Fill out the below Access Control Matrix so as to adequately reflect the permissions of the given
subjects over the specified objects. Recall, in a Bell-LaPadula model, the only two allowed
operations are: read (R) and write (W).
11
Solution
12
6. Risk Management [20 points]
Considering this particular expression for cyber risk, and the general purpose of internal security
controls (aka security safeguards), which of the following statements is not correct?
e) The purpose of security safeguards is to reduce R.
f) The purpose of security safeguards is to reduce Pa .
g) The purpose of security safeguards is to reduce Ps .
h) In most cases, security safeguards do not impact the value of V.
Solution
13
b) [3 points] The second most prominent threat facing ABC Company’s database server
(from question 6.2.a)) is a DoS / DDoS attack. Some of the data pertaining to the cyber risk
associated with this threat is show in the below table. Enter the missing values.
Give a clear ‘yes’ or ‘no’ answer, and provide numerical (monetary) justification for full credit.
Solution
14
Final Exam - Grade Statistics
Average: 60.08
Max: 94
Min: 28
# of A/A+: 10
15