CSE3400 Final ExamCalculators are allowedClosed book + notes.Review HW Problems. An answer guide for HW5 will be available immediately after the due date.Chapter 3: MAC Know what a MAC is, but I wont ask you to prove or disprove something is a MAC. You willhave to use them though. Know that MACs are symmetric key systems. Their purpose is to ensure integrity not secrecy key holders can create a “tag” of any message key holders can verify that the given tag and message are authentic (i.e., an adversary cannotforge a tag without having the secret key) Know the differences between MAC and digital signatures (beyond the latter being public keyof course). Know how CBC MAC works to MAC a message of arbitrary, but fixed, length. Know thedefinition of CBC MAC.Chapter 5: Know the definition of public key encryption Be able to prove something is not a secure public key system What is the difference between EAV and CPA in public key enc.? (Hint: there is none – but why?) Know the DH key exchange protocol and text-book RSA. If you need OAEP I will provide youthe definitions Be able to derive a public/private key given small numbers for textbook RSA.Given the definition of OAEP, understand the meaning behind it (e.g., why pad with 0s?Why pad with random “r”?) If you need ElGamal, I will give you the definitions Be able to construct MitM attacks against protocols (e.g., key exchange, enc., or more broad –much like on HW4)Chapter 7: Know the SSL/TLS handshake protocol and why each part is important (e.g., why is itimportant that both server and client choose “nonces”) I will provide you with the general handshake protocol – but know why each part of it isimportant for security Also know how many keys are actually established at the end – and why? Also, why notjust use a single session key? Given a variant of the handshake protocol, show it is insecure. Know about certificate authorities – what problem do they solve? What are the strengths andweaknesses of that system? What, at a minimum, must be in a certificate and why? Know the history of SSL/TLS – not exact dates, but what was the difference in v2 and v3 forinstance? What security guarantees does SSL/TLS give? What is the cipher suite downgrade attack?Wireless Security: Given the four-way handshake used by WPA2, explain the importance of each step or certaindesign choices Given a modified handshake protocol, show it is insecure by constructing an actual attack. Know the general history of WEP/WPA/WPA2 (not exact dates necessarily)General (Combination of Chapters 3,5, and 7, plus past work): Be able to construct attacks against a given protocol given a particular attack model (e.g., EAVor MitM) Be able to construct a secure protocol (e.g., key exchange), given certain tools and a securitymodel.本团队核心人员组成主要包括BAT一线工程师,精通德英语!我们主要业务范围是代做编程大作业、课程设计等等。我们的方向领域:window编程 数值算法 AI人工智能 金融统计 计量分析 大数据 网络编程 WEB编程 通讯编程 游戏编程多媒体linux 外挂编程 程序API图像处理 嵌入式/单片机 数据库编程 控制台 进程与线程 网络安全 汇编语言 硬件编程 软件设计 工程标准规等。其中代写编程、代写程序、代写留学生程序作业语言或工具包括但不限于以下范围:C/C++/C#代写Java代写IT代写Python代写辅导编程作业Matlab代写Haskell代写Processing代写Linux环境搭建Rust代写Data Structure Assginment 数据结构代写MIPS代写Machine Learning 作业 代写Oracle/SQL/PostgreSQL/Pig 数据库代写/代做/辅导Web开发、网站开发、网站作业ASP.NET网站开发Finance Insurace Statistics统计、回归、迭代Prolog代写Computer Computational method代做因为专业,所以值得信赖。如有需要,请加QQ:99515681 或邮箱:99515681@qq.com 微信:codehelp QQ:99515681 或邮箱:99515681@qq.com 微信:codehelp
网友评论