Assignment title: Information


EECN750 – Network Security (2015-2016) Page 1 of 5 Department of Engineering Independent Learning Package 2015 – 2016 Module code: EECN750 Module Title: Network Security Level: 7 Due date: set by your course leader INSTRUCTIONS  All questions to be answered  Completed work to be handed to the registry office by the above deadline  A soft copy must be submitted online to Blackboard for plagiarism checks  Submission of your ILP indicates that you are ready for your viva  Your submission should be in bound form EECN750 – Network Security (2015-2016) Page 2 of 5 Question 1 Alice encrypts her message with Bob's public key and sends to Bob. Bob receives and decrypts using his private key. Bob then send the same message back to Alice encrypted using Alice's public key. Analyse the security of this communication protocol in terms of what assurance it provides to Alice and to Bob and what attack it might be subject to. Question 2 a. Contrast in terms of security and efficiency the Diffie Hellman procedure for setting up a secret session key with the approach in which Alice sends the session key to Bob encrypted using Bob's public key. b. Compute 540mod 17 on paper, showing the steps. c. Given 3amod 53 = 24 compute a. Explain your method. Question 3 Question 4 The RSA procedure involves two prime numbers p, q from which N = pq is computed. A public exponent e is chosen (often with the value 65537) and private exponent d computed to satisfy: ed = 1 mod (p − 1)(q − 1). a. Of these parameters p, q, N, e, d, which form the public and which the private key? b. Use one of the websites supporting modular arithmetic to determine the private exponent d for the case where p = 7437887, q = 3023981 and e = 65537. Use this to encrypt the message "Hello". Explain your steps and show how to decrypt this message. How would you encrypt a longer message? c. Explain what is meant by a side channel, and describe the basis of a side channel attack on RSA. d. Explain how RSA is used for digital signatures. a. A 64-bit block of ciphertext c is obtained by XOR'ing a 64-bit key K against the 64-bit plaintext message m . c = K ⊕ m. Knowing the key K, how is m recovered from the ciphertext c? b. If the operation was c = K&m (where & is bitwise AND), how would m be recovered? c. Compute 167 ⊕ 118 (⊕ is XOR) where each of the numbers should be interpreted as unsigned binary (without any 2's complement). Give your answer as a decimal number in the range [0,255]. d. A one time pad (OTP) is used to generate a random sequence of bytes to XOR with a plaintext message. This system can be proved to be secure, but the equivalent stream cipher based on a pseudo random number generator cannot be proved so. Explain why there is a difference. EECN750 – Network Security (2015-2016) Page 3 of 5 Question 5 a. Estimate the time it would take to brute force DES on a modern desktop computer. Clearly state your assumptions about the machine and explain how you would recognise that you had found the correct key. b. Using the same machine, estimate how long it would take to brute force 512-bit RSA by factorisation. State your assumptions about the factorisation algorithm. Question 6 a. Make a brief comparison between the overall system architecture of GSM and UMTS. Provide a diagram of their respective architecture if required. b. Explain the three aspects of security provision in GSM outlining their importance. c. Explain how GSM improved the security aspects of the system compared with the first generation phones. d. Explain in bullet points the algorithms and parameters involved in security provision by GSM. Question 7 a. Identify the drawbacks of security arrangements in GSM. Provide one specific example of attacks caused by the drawbacks. b. Outline the differences in security between the GSM and GPRS. c. Discuss in bullet points how the security is improved in UMTS and future phone generations. d. Explain briefly the modified security mechanisms in UMTS and explain the role of two security parameters. Question 8 a. Discuss briefly ways in which a hacker can identify the operating system running on a remote machine then explain why this information is important for a potential attack. b. A small branch office of a large company with around 20 staff is performing poorly and there are rumours that around a third of the workers are to be made redundant. One of the workers is fairly good with computers and decides to eavesdrop on the network traffic between the manager's office and the headquarters in the hope of finding out what is being planned. All the computers in the branch office are on a switched network and the uplink port of the switch is connected to the branch office firewall router which connects to the main company headquarters. Staff including the manager use company laptops and any laptop can connect to any network socket. Outline a way in which this might be achieved giving details of any tools that may be of use. Question 9 a. SYN scan, Connect scan, NULL scan, XMAS scan, FIN scan and UDP scan are all Port Scanning techniques used to discover open ports on a target system. Describe any two of these and state clearly how a port can be discovered to be open. Which one of the above technique is stealthy? Give reasons for your answer. b. What is a RootKit? Explain the purpose of this and give an example of software that can be used to detect it. EECN750 – Network Security (2015-2016) Page 4 of 5 Question 10 a. Explain how an NIDS processes data. b. A switch can be used to copy incoming data from the Internet to a Firewall and direct it to an NIDS. Unlike hubs, switches do not generally flood data. Explain how a Cisco 3560 switch can be configured to ensure that the NIDS gets the same copy of the data that goes to the Firewall c. What measures can be taken to ensure that an NIDS will not be visible to an attacker? d. How does an Anomaly-Based NIDS differ from Signature-Based NIDS? e. What is a Host-Based IDS (HIDS)? Where is this used? Question 11 a. Explain the functions and applications of a i) Packet Filtering Firewall ii) Stateful Firewall iii) Proxy Firewall. b. With the aid of a suitable example, explain how Dynamic Access Control Lists can be used in Network Security. Question 12 a. Apart from Encryption and Authentication, describe other measures that can be employed to enhance the security level in 802.11 based wireless networks and explain why you may not use all the measures available. b. What benefits does distributed client/server architecture of RADIUS provide? c. Describe the steps involved in the process of Authentication when a wireless client requests for connection to an Access Point in a system setup to use a RADIUS server. d. EAP-FAST is one of the variation of the EAP protocols available in 802.1x based authentication. How does it differ from LEAP? Question 13 a. There are many types of attacks that can be launched against a networked computer system. Explain the operation of the following attacks: i) Man In The Middle (MITM) ii) Distributed Denial of Service (DDoS) b. For each of the methods of attack in part a) above, briefly explain a possible counter measure that can be used. c. List two other types of attacks that are common and give a description of each. EECN750 – Network Security (2015-2016) Page 5 of 5 Question 14 Consider this scenario. Then answer each of the following questions. OS Foods is a small company of roughly 50 employees. You have three servers: a domain controller, a file server, and a server that provides mail and FTP services to internal and external employees. There are 30 Windows XP desktops shared by various employees. The network is isolated from the Internet by a firewall. Wired local network access is provided by a switched infrastructure. Wireless access is enabled by three suitably-placed access points. a. If this were your actual company, which assets would you deem most critical to protect against possible attacks. b. Select two of those assets, and identify the threats they face. c. OS hardening is the process of eliminating common vulnerabilities by modifying the basic configuration options of the system. List five steps that you could take to harden an operating system. Question 15 Virtual Private Networks (VPNs) are commonly used to add an extra layer of security in the transport of data over a shared network using protocols such as PPTP, L2TP and IPSec. a. State the layer of the OSI model at which the above protocols work b. IPSec is an open standard suite which provides protocols to perform various functions. Distinguish between the IPSec Authentication Header (AH) and Encapsulating Payload (ESP) c. A medium sized business wishes to network two sites using IPSec VPN over the internet. The available bandwith is 100Mbs. Suggest the type of VPN that could be setup to achieve this and state your choice of IPSec configuration giving reasons. d. Is it possible to encrypt the entire Packet before transmission? Give reasons for your answer.