Chapter 29
Chapter 29
Cryptography and
Network Security
Exercises
1.
b. This is modification (the attack to integrity service). The value of the check is
changed (from $10 to $100).
c. This is denial of service (the attack to availability service). Sending so many e-
mails may crash the server and the service may be interrupted.
3. Double encryption here does not help. Encryption with k1 followed by encryption
with k2 is the same as encryption with k = (k1 + k2) mod 26. The following shows
the proof. P is the plaintext and C is the ciphertext.
5.
1
2
7.
a. (01001101) ⊕ (01001101) = (00000000), which means that if the two input
words are the same, all the bits in the output word becomes 0’s. This property is
used in ciphers.
b. (01001101) ⊕ (10110010) = (11111111), which means that if the two input
words are complement of each other, all the bits in the output word becomes
1’s. This property is also used in ciphers.
9.
a. Using 26 for space, the plaintext is: 19070818260818261914200607
b. For encryption, we create 4-digit blocks:
12. Figure 29.E13 shows one simple, but not very secure solution. It shows the idea,
but it is vulnerable to some attacks. There are some better, but more complicated
solutions.
a. In the first message, Alice sends her identification and her nonce.
b. In the second message, Bob sends his identification, his nonce, and encrypted
Alice’s nonce. Alice’s nonce is encrypted with the shared secret key. When
Alice receives this message and decrypts her nonce, Bob is authenticated for
her because only Bob can encrypt Alice’s nonce with the shared secret key.
c. In the third message, Alice sends encrypted Bob’s nonce. When Bob receives
this message and decrypts his nonce, Alice is authenticated for Bob because
only Alice can encrypt Bob’s nonce with the shared secret key.
Figure 29.E13 Solution to Exercise 13
1 Alice, RA
Bob is Bob, RB , RA 2
authenticaed
3 RB Alice is
authenticaed
d.
15. Figure 29.E15 shows one simple, but not very secure solution. It shows the idea,
but it is vulnerable to some attacks. There are some better, but more complicated
solutions.
Figure 29.E15 Solution to Exercise 15
1 Alice, RA
Bob is
authenticaed
Bob, RB , SigB (RA) 2
Alice is
3 SigA (RB) authenticaed
a. In the first message, Alice sends her identification and her nonce.
b. In the second message, Bob sends his identification, his nonce, and signed
Alice’s. Bob uses his private key to sign the message carrying Alice’s nonce.
When Alice receives this message and verifies the signature, Bob is authenti-
4
cated for her because only Bob could have signed Alice’s nonce using his pri-
vate key.
c. In the third message, Alice sends Bob a signed message that include the Bob’s
nonce. Alice signs this message with her private key. When Bob receives this
message, Alice is authenticated for Bob because only Alice can sign a message
with her private key.