ICOM 5018 - Cryptography & Network Security

1.     Test #1: Tuesday, March 9, 2010

2.     Coverage

a.       Chapters 1-10

b.      The review problems will be discussed in class (mostly by you people)

c.       One-half the test will be problems chosen from the review problems, the rest will be based on the text material

3.     Review problems

a.       3/2, 3.15

b.      4.16, 4,22

c.       6.12, 6.3

d.      7.4, 7.12

e.       8.20, 8.4

f.        9.7, 9.9 (but don’t spend a lot of time on this one),

4.     Review topics

5.      Mathematical –

Level is typical unstarred in math chapters

1.      Protocol -

2.      What-if&why analysis of protocols - 

a.       key exchange is full of these 

b.      notation 

c.       nonce idea & its uses 

3.      Scenario question

                                                              i.      Private-key crypto -

4.      All use multiround structure, either Feistel or reversible ops.

5.      Key scheduling algorithm

6.      What are differential & linear crypto

7.      The attacks -

a.       known ciphertext

b.      plaintext

c.       chosen plaintext

d.      password guessing

e.       traffic analysis

8.      Modes, CFB, etc.

a.       Meet inthe middle - relate to double/triple DES

9.      Math – again

 

1.