CS 257 - Problem Set 4
| Assigned: | Monday October 12 |
| Deadline: | Thursday October 29, 11:59pm |
Reading
Mark Stamp, “Information Security: Principles and Practice”,
Chapters 5 and 7.
Available at Yale as a licensed online book.
Deliverable
Create a pdf file yournetid.cs257hw4.pdf with your
answers to the following questions. DO NOT include your name or netid
in the file. You should use
gradescope to submit your assigments.
Problem 1: (10 points) [Chapter 5, problem 1, page 153]
As discussed in this chapter, a cryptographic hash function must satisfy
all of the following properties:
- Compression
- Efficiency
- One-way
- Weak collision resistance
- Strong collision resistance
- Suppose that a hash function fails to provide compression but provides
all of the other required properties. Give an application
where a cryptographic hash function should be used, but where
this hash function would fail to be useful.
- Repeat part a, but assume that all properties hold except for efficiency.
- Repeat part a, but assume that all properties hold except for oneway.
- Repeat part a, but assume that all properties hold except for the
collision resistance properties.
Problem 2: (10 points) [Chapter 5, problem 8, page 155]
Consider a CRC that uses the divisor 10011. Find two collisions with
10101011, that is, find two other data values that produce the same
CRC checksum as 10101011.
Problem 3: (10 points) [Chapter 5, problem 17, page 156]
Recall the online bid method discussed in Section 5.8.1.
- What property or properties of a secure hash function h does this
scheme rely on to prevent cheating?
- Suppose that Charlie is certain that Alice and Bob will both submit
bids between $10,000 and $20,000. Describe a forward search
attack that Charlie can use to determine Alice's bid and Bob's bid
from their respective hash values.
- Is the attack in part b a practical security concern?
- How can the bidding procedure be modified to prevent a forward
search such as that in part b?
Problem 4: (10 points) [Chapter 5, problem 33, page 161]
Consider a "2 out of 3" secret sharing scheme.
- Suppose that Alice's share of the secret is (4,10/3), Bob's share
is (6,2), and Charlie's share is (5,8/3). What is the secret S?
What is the equation of the line?
- Suppose that the arithmetic is taken modulo 13, that is, the equation
of the line is of the form ax + by = c (mod 13). If Alice's share
is (2,2), Bob's share is (4,9), and Charlie's share is (6,3), what is
the secret S? What is the equation of the line, mod 13?
Problem 5: (10 points) [Chapter 5, problem 37, page 122]
Suppose that you have a text file and you plan to distribute it to several
different people. Describe a simple non-digital watermarking method
that you could use to place a distinct invisible watermark in each copy
of the file. Note that in this context, "invisible" does not imply that the
watermark is literally invisible—instead, it means that the watermark
is not obvious to the reader.
Problem 6: (10 points) [Chapter 7, problem 5, page 255]
Suppose that on a particular system, all passwords are 10 characters,
there are 64 choices for each character, and the system has a password
file containing 512 hashed passwords. Furthermore,
Trudy has a dictionary
of 220 common passwords. Provide pseudo-code for an efficient
attack on the password file in the following cases.
- The password hashes are not salted.
- The password hashes are salted.
Problem 7: (10 points) [Chapter 7, problem 10, page 256]
Suppose all passwords on a given system are 8 characters and that
each character can be any one of 64 different values. The passwords
are hashed (with a salt) and stored in a password file. Now suppose
Trudy has a password cracking program that can test 64 passwords per
second. Trudy also has a dictionary of 230
common passwords and the
probability that any given password is in her dictionary is 1/4. The
password file on this system contains 256 password hashes.
- How many different passwords are possible?
- How long, on average, will it take Trudy to crack the administrator's
password?
- What is the probability that at least one of the 256 passwords in
the password file is in the dictionary?
- What is the expected work for Trudy to recover any one of the
passwords in the password file?
Problem 8: (10 points) [Chapter 7, problem 20, page 259]
Suppose that you have n accounts, each of which requires a password.
Trudy has a dictionary and the probability that a password appears in
Trudy's dictionary is p.
- If you use the same password for all n accounts, what is the probability
that your password appears in Trudy's dictionary?
- If you use distinct passwords for each of your n accounts, what
is the probability that at least one of your passwords appears in
Trudy's dictionary? Show that if n = 1, your answer agrees with
your answer to part a.
- Which is more secure, choosing the same password for all accounts,
or choosing different passwords for each account? Why? See also
Problem 21.
Problem 9: (10 points) [Chapter 7, problem 27, page 260]
Suppose DNA matching could be done in real time.
- Describe a biometric for secure entry into a restricted facility based
on this technique.
- Discuss one security concern and one privacy concern with your
proposed system in part a.
Problem 10: (10 points) [Chapter 7, problem 37, page 263]
Suppose that a particular iris scan systems generates 64-bit iris codes
instead of the standard 2048-bit iris codes mentioned in this chapter.
During the enrollment phase, the following iris codes (in hex) are determined.
User Iris code
Alice BE439AD598EF5147
Bob 9C8B7A1425369584
Charlie 885522336699CCBB
During the recognition phase, the following iris codes are obtained.
User Iris code
U C975A2132E89CEAF
V DB9A8675342FEC15
W A6039AD5F8CFD965
X 1DCA7A54273497CC
Y AF8B6C7D5E3F0F9A
Use the iris codes above to answer the following questions.
- Use the formula in equation (7.1) to compute the following distances:
d(Alice, Bob), d(Alice, Charlie), d(Bob, Charlie).
- Assuming that the same statistics apply to these iris codes as
the iris codes discussed in Section 7.4.2.3, which of the users,
U,V,W,X,Y, is most likely Alice? Bob? Charlie? None of the
above?