Name:

Information Assurance: Homework 4

Due March 31, 2009 on compass assessments.

NOTE: Choices may appear in a different order on compass.

Question 1: Which statement is correct about hash functions?

1. Hashes are not unique; that is, two or more messages can have the same hash.

2. It is prohibitively difficult to find two messages with the same CRC (collision).

3. Symmetric ciphers are designed for encryption and cannot be used as hash functions.

4. If an attacker finds a collision in a hash function, HMAC using that hash function is considered unsafe.

Question 2: Which statement is true about the key exchange protocol?

1. Needham-Schroeder with Denning-Sacco modification is susceptible to replay attack.

2. Needham-Schroeder protocol requires synchronized clocks.

3. Otway-Rees protocol is susceptible to replay attack.

4. Otway-Rees protocol does not require synchronized clocks.

Question 3: In Otway-Rees protocol, what prevents Eve to replay the third message to Bob, forcing him to use an old session key?

1. Encryption with kB

2. Nonce r1

3. Encryption with kA

4. Nonce r2

Question 4: In the Clipper Chip key escrow system, who can recover the session key?

1. The escrow agencies if all of them agree.

2. It is possible to recover the session key from the LEAF alone even if no escrow agency agrees.

3. Any one of the escrow agencies.

4. No one other than the Clipper Chip user.

Question 5: Which statement is true about memory protection?

1. For security reasons, the base address of program B is always larger than (base+bound) address of program A. (assuming that A resides in a lower memory address)

2. A piece of code with CPL=RPL=2 can call another code with DPL=1 through a call gate with DPL=3.

3. A piece of code with CPL=RPL=3 can access a region of data with DPL=0.

4. When using stack switching, each program has its own stack.

Question 6: Which statement is true about a password-based authentication system?

1. Statistically, a 10-character pronounceable password is as secure as a 10-character pseudo-random password.

2. If the system uses salting, C={salt||hash(salt||password)}

3. Salt, like a cryptographic key, must always remain secret.

4. Without knowing F and C, dictionary attack is not possible.

Question 7: What must be the minimum length for a password consisting of only small letters and numbers for it to be at least 50% secure over a year? (Assume that the attacker can check 1,000,000 passwords/sec)

1. 6 characters

2. 7 characters

3. 8 characters

4. 9 characters

Question 8: Which statement is true about the S/Key protocol?

1. The hashes can be sent in order (not reversed) without losing the security.

2. The number of total allowed authentications using a seed must be known ahead of time (i.e. before the first authentication attempt.)

3. The third message (i.e. {pi}) must be encrypted to prevent impersonation.

4. The hashes are sent in the reverse order to prevent replay attack.

Question 9: Which statement is true?

1. In a system with the Bell-LaPadula policy, a subject with clearance (S, {Project1, Project2}) can read a file with classification (C, {Project3}).

2. In a system with the low-water-mark Biba policy, if a subject with integrity level S reads an object with integrity level TS, the integrity level of the subject remains the same.

3. In a system with the Bell-LaPadula policy, a subject with clearance (S, {Project1}) can write to a file with classification (TS, {Project1, Project2}) even if the permission bits of the file is set to read-only.

4. In a system with the low-water-mark Biba policy, a subject with integrity level TS is not allowed to read an object with integrity level S.

Question 10: Which statement is true about a system with Chinese Wall policy?

1. A subject s with PR(s)={file1, file2} can write to unsanitized file2 with CD(file2)=bank3, if s can read file3 with CD(file3)=bank4.

2. A subject s with PR(s)={file1} can read unsanitized file2 if CD(file1)=bank1, CD(file2)=bank2, COI(file1)={bank1, bank2}, and COI(file1)={bank1, bank2}.

3. A subject s with PR(s)={file1} can write to unsanitized file2 if CD(file1)=bank1, CD(file2)=bank2, COI(file1)={bank1, bank2}, and COI(file1)={bank1, bank2}.

4. A subject s with PR(s)={file1, file2} can read unsanitized file2.