workshop-week2

.pdf

School

University of Melbourne *

*We aren’t endorsed by this school

Course

90043

Subject

Computer Science

Date

Apr 3, 2024

Type

pdf

Pages

2

Uploaded by EarlDiscovery12317

Report
COMP90043 Cryptography and Security Workshop Week 2 Lecturer: Prof. Udaya Parampalli Preparation: 1. Please study modular exponentiation and fast modular exponentiation 2. Advanced students: Please read Chapter 1 and finish reading Chapter 2 of textbook. Questions: 1. Fast Modular Exponentiation. Solve the following: (a) ( 6) 23 mod 33 (b) 12 200 mod 7 (c) 7 100 mod 10 (d) Recap: Two integers p and q are said to be congruent modulo n , if ( p mod n ) = ( q mod n ). This is written as p q (mod n ). Given that 5 x 6(mod8), find x . (e) Prove that 2 n + 6 9 n is always dividible by 7 for any positive integer n . 2. When considering Data, stored digitally, how would you determine the satisfaction of the following criteria: (a) Confidentiality (b) Integrity (c) Availability (d) Authentication (e) Accountability Which one of the three in the CIA Triad (Confidentiality, Integrity and Availability) do you think is the MOST important? 3. For each of the following assets, assign a low, moderate, or high impact level for the loss of confidentiality, availability, and integrity, respectively. Justify your answers. (a) A student maintaining a blog to post public information. (b) An examination section of a university that is managing sensitive information about exam papers. (c) An information system in a pathological laboratory maintaining the patient’s data. (d) A student information system used for maintaining student data in a university that contains both personal, academic information and routine administrative information (not privacy related). Assess the impact for the two data sets separately and the information system as a whole. (e) A University library contains a library management system which controls the distribution of books amongst the students of various departments. The library management system contains both the student data and the book data. Assess the impact for the two data sets separately and the information system as a whole. 4. Security Attacks and Threats: (a) Define a Security Threat and a Security Attack. (b) Define the following attacks: Copyright © University of Melbourne
i. Denial of Service ii. Release of Message Contents iii. Message Modification iv. Masquerade v. Traffic Analysis vi. Replay From the above, identify which constitute as active attacks and which constitute as passive attacks? Copyright © University of Melbourne
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help