Professional Documents
Culture Documents
Signature: ..
Class: ..
Exam
Preamble
1. The exam is divided into two sections: the first consists of a series of multiple choice questions while the
second is composed of two exercises.
2. For a multiple choice question, the correct answer can consist of one, many, or none among the proposed
alternatives. The full mark is attributed to the student if his answer is fully correct; otherwise a zero is attributed
for the question.
3. The student must submit his answers to the first section on the present exam sheet. Any answer that does not
fulfil this requirement will not be considered.
4. The exam is three-page long.
Q2.
How many potential keys should be generated to break a 2-DES key using mmet-inthe-middle attack?
(a) 256.
(b) 2116.
(c) 2168.
(d) 257.
O
O
O
O
The public parameter e of the RSA algorithm in the case where p=11, q=5, and d=3
equals:
(a) 5
(b) 107
(c) 231
(d) 1
O
O
O
O
Q3.
(a)
(b)
(c)
(d)
O
O
O
O
(a)
(b)
(c)
(d)
O
O
O
O
(a)
(b)
(c)
(d)
O
O
O
O
Q4.
Q5.
Q6.
Q7.
Q8.
(a)
(b)
(c)
(d)
Q9.
Consider a cryptosystem where two keys k1 and k2 are used to encipher and decipher
the messages, respectively. Given that k1= k2+c mod(n), where c and n are two
constants, is this cryptosystems:
(a) Symmetric.
(b) Asymmetric.
Q10.
O
O
O
Exercise 1. (7 points)
The information system of an organisation X consists of the following resources:
Exercise 2. (5 points)
A password-based protocol used by a server to authenticate clients consists of the following
steps:
a. A password P is securely shared with every client server.
b. The client sends x=h(P) to the server, where h is a hash function.
c. The server computes x=h(P) from its local copy of P and matches x and x. Access is
granted if x=x.
1- Explain how an attacker can gain access to the server by capturing the traffic between
the server and a specific client.
2- Improve the protocol, without modifying the number of steps, to prevent the
aforementioned attack.