CSE 565 Computer Security
Solution Key for Midterm 1
Question 1: 12 (4 + 4 + 4 points)
a) Using Vigenere table, encrypt the following message using the
repetitive key "considers".
key:
plaintext:
cons
9/10/2015 CSE 565: Computer Security Due: In Class, Sept. 24, 2015
Homework 1
Problem 1.
Look up the open literature and write about one cyber security incident (this could be a recent
malware or syst
CSE 565 Computer Security
Solutions to Homework 4 Problems
Question 1:
The four approaches are i) secret key distribution using symmetric encryption and a KDC, ii)
secret key distribution using symmet
-l-—
Subbh’mam'lrmvb ﬂNfTLW‘AD I CgE $1»;
CYbf’h) tat/flat )49oL fuwv'twns ﬁewyaha
Mbbh ’rhrwtiﬁx “hm/’5’} be. zgh'ﬂ‘ mt "yr WWW} be WWH: by w Ox &A+Q
ob‘yc’f rbq‘vm ca Mm)‘ wAw (N'DMLO 1W1f3)rm~£ wan
Written By:
Adam Berent
Advanced Encryption Standard by Example
V.1.7
1.0 Preface
The following document provides a detailed and easy to understand explanation of the implementation of the AES
(RIJNDA
Material borrowed from slides available at http:/williamstallings.com
Presented by: Ruchika Mehresh
Shambhu J. Upadhyaya
Computer Science and Engineering
University At Buffalo,
Buffalo, New York , 142
S. Erfani, ECE Dept., University of Windsor
0688-590-18 Network Security
1- El Gamal and Digital Signature Algorithm
A public-key algorithm was devised in 1984 by T. El Gamal based on discrete
logarit
10/5/2015
CSE 565: Computer Security
Due: 11/05/2015
Fall 2015
Project 2
Web Security and Symmetric Key Crypto Implementation
[Total Points that can be earned: 100]
This project is in two parts, viz.
10/09/2015
CSE 565: Computer Security Due: 10/27/15 in class
Homework 3
Problem 1: (optional)
Problem 10.1 from Stallings, 6e.
Users A and B use the D-H key exchange technique with a common prime q =
09/20/2015
Stream Ciphers and Block Ciphers:
A stream cipher is one that encrypts a digital data stream one bit or
one byte at a time.
A block cipher is one in which a block of plaintext is treated as
CSE565: Computer
CSE565: Computer
Security
Security
Shambhu Upadhyaya
Computer Science &
Eng.
University at Buffalo
UB Fall 2010
9/01/15
Buffalo, New York, 14260
UB Fall 2015
CSE565: S. Upadhyaya
Lec
Name: _ P. No _
Quiz 1
CSE 565
September 17, 2015
Time: 15 minutes
Question 1: (8 + 2 points)
a) Vernam cipher is a type of one-time pad where an arbitrarily long nonrepeating sequence of numbers is
c
CSE565: Computer Security
CSE565: Computer Security
Lectures 3 & 4
Lectures 3 & 4
Block Ciphers and Data
Block Ciphers and Data
Encryption Standard
Encryption Standard
Shambhu Upadhyaya
Computer Scien
CSE 565 Computer Security
Solutions to Homework 3
(Max. is 60, optional questions will not be graded)
Problem 1: (optional)
1. YA = 75 mod 71= 51
2. YB = 712 mod 71= 4
3. K = 45 mod 71= 30
Problem 2:
CSE 565 Computer Security
Solution Key for Homework 2 (Total points you can earn is 55)
Question 1(optional)
Rijndael is an algorithm and AES is a standard. Rijndael allows for block lengths of 128, 1
11/13/2015
CSE 565: Computer Security
Due: 11/24/2015 (in Class)
Project 3
E-mail Forensics with DKIM
1. Background
Digital Forensics is an inevitable topic in Computer Security. It is about finding u
CSE 565 Computer Security
Solution Key for Homework 2 (Total points you can earn is 55)
Question 1(optional)
Rijndael is an algorithm and AES is a standard. Rijndael allows for block lengths of 128, 1
Name: _
Quiz 2
CSE 565
October 6, 2015
P. No _
Time: 15 minutes
Problem 1. Determine (19) and (33) where (n) is Eulers totient function.
Ans:
(4 points)
Since 19 is prime, (19) = 18. Since 33 = 11 x 3
Name: _ P. No _
Quiz 3
CSE 565
October 27, 2015
Time: 15 minutes
Problem 1: (6 + 8 points)
a) The following diagram shows a decentralized secret key distribution scheme (as opposed to the one with a
t
Name: _ P. No _
Quiz 3
CSE 565
October 27, 2015
Time: 15 minutes
Problem 1: (8 + 6 points)
a) One local area network vendor provides a key distribution facility, as illustrated in the following figure
11/02/2015
CSE 565: Computer Security Due: 11/09/15 in 329 Davis Hall by Noon
Homework 4
(Solution keys will be made available Monday Afternoon)
Question 1: List the four distinct key distribution sch
CSE 565: Computer Security, Fall 2015
Lecture Hours: Tu Th 8:00 am - 9:20 am (104 Knox)
Instructor and E-mail address: Dr. Shambhu J. Upadhyaya; [email protected]
Ofce Hours: Tuesdays 9:30 am 11:00
CSE 565 Computer Security, Fall 2015
Solution Key for Homework 1
Problem 1. (10 points)
You could go on the Internet and find out a list of famous/notorious malware or some highly talked about hack an