0% found this document useful (0 votes)
122 views

Student's Name: - : CS572AH2 Homework-3 Assignment

This document provides instructions for a homework assignment on computer security. It instructs students to complete 5 questions related to topics like modular arithmetic, message authentication codes, worms vs viruses, and web beacons. Students are asked to show their work and provide their name. The document provides examples and context to help students understand and answer the questions.

Uploaded by

Benedict Onyango
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
0% found this document useful (0 votes)
122 views

Student's Name: - : CS572AH2 Homework-3 Assignment

This document provides instructions for a homework assignment on computer security. It instructs students to complete 5 questions related to topics like modular arithmetic, message authentication codes, worms vs viruses, and web beacons. Students are asked to show their work and provide their name. The document provides examples and context to help students understand and answer the questions.

Uploaded by

Benedict Onyango
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
You are on page 1/ 2

CS572AH2 Computer Security Homework-3 Assignment SP 2021

_____________________________________________________________________________________________

CS572AH2 Homework-3 Assignment

Send your HW3 Report electronically

Student’s Name: ___________________

Show all your work in detail for the highest grade. Good luck!

1. (15 pts.) Consider the mod 10 multiplication table (see the table on the right, below):

a. Which rows contain a value of 1? {in increasing numerical order} __1_, __2__, __3__,
____.

b. These rows and no others contain a value of 1 because they are the only ones that are
____congruent____ to 10.

c. These numbers are significant for mod-10 arithmetic because only these numbers have
___congruence___, mod 10.

2. (10 pts.) [Fill out your answers {a function name and a number} directly in the text]:

In the Number Theory, two integers, n and m, are said to be relatively prime (or co-primes) when
their __nX+mY__(n, m) {a function} = __1___{a number}.

3. (10 pts.) [Message Authentication Codes]

1
CS572AH2 Computer Security Homework-3 Assignment SP 2021
_____________________________________________________________________________________________

Bob sends a message to Alice. He sends the message in plaintext, but first he uses a Message
Authentication Code (MAC), with a secret key he shares with Alice, to create a cryptographic
checksum for the message. He sends the cryptographic checksum along with the message.

Upon receipt of the message, Alice uses the same MAC algorithm and key to generate a
cryptographic checksum. She compares the two checksums and finds them to be identical.

As a result, what two things is Alice assured of about the message? _the message has not been
altered and the message is from authenticated sender (Bob)______________

What is she not assured of? _proper sequence because an attack can alter the sequence
number_

4. (15 pts.) What is the essential difference between a worm and a virus?

Your Answer: _________________

5. (15 pts.) [Fill out your answers directly in the text]: Sometimes, web pages contain tiny images,
too small to be visible to the user. Such an image is called a _____web beacon______, and its
purpose is to convey information to a web server operated by a company that
_____pseudonymously record and collect______ your navigation through the web.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy