CMSC 414

(Section 0301) Exam 1 info

Spring 2013

What does exam 1 cover:

Example problems:

  1. Can you obtain RSA keys starting from p = 11 and q = 19. If not, explain. If yes, obtain n, e, d.
  2. Do n = 51, e = 3, d = 11 consitute valid RSA parameters. If not, explain. If yes, obtain the corresponding p and q.
  3. Give the key size and block size for DES.
  4. Give the key size and block size for 3DES.
  5. Give the key size and block size for AES.
  6. How many block encryption operations and block XOR operations are required to achieve ECB-DES encryption of a message of 20 blocks.
  7. How many block encryption operations and block XOR operations are required to achieve CBC-DES encryption of a message of 20 blocks. What is the size of the output.
  8. How many hash operations are required to achieve an HMAC keyed hash of a message of 20 KB.
  9. You are given a hash function that outputs a 32-bit hash. You want to find a collision in 20-character strings. How much memory would you use. How many hashes would you expect to compute. Explain briefly.
    If your hash function did not do a good job in generating random outputs, how would this affect your answers.
  10. Consider the following authentication handshake between A and B (like what I described in class). Here, [pubA, privA] denotes A's public-key pair, [pubB, privB] denotes B's public-key pair, and each has the other's public key.
    1. A generates random nA, sends [A,B,X(nA,pubB)].
    2. B receives this message, generates random nB, sends [A,B,X(nB,pubA),X(nA,priB)], and sets the session key to (nA XOR nB).
    3. A receives this message, sends [A,B,X(nB,priA)], and sets the session key to (nA XOR nB).
    Can an attacker who sees the messages obtain the session key?