Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1- What are the two most important factors in determining the strength of a cryp

ID: 3592166 • Letter: 1

Question

1- What are the two most important factors in determining the strength of a cryptographic key? (Note: The question asks about the key, not the cryptosystem as a whole.)

2- Name the three things related to security that the McCumber Model is intended to cause us to think about. (Hint: What do the three faces of that cube represent?)

3- Name and briefly describe the three properties of a secure information system. These are attributes of information that together describe a secure system. (Hint: three-letter initialism.)

4- - What is “social engineering”?

5- A one-time pad cryptosystem has a provable property that no other cryptosystem has. What is it?

6- Distinguish between computationally secure and absolutely secure encrypted messages.

7- Name one way of defeating or mitigating traffic analysis.

8- Describe what must happen with respect to public keys for a “man-in-the-middle attack” to succeed when messages are encrypted using public key cryptography.

9- Of symmetric key cryptography and public key cryptography, which is less computationally intensive?

10- Distinguish between mandatory access control and discretionary access control.

Explanation / Answer

1. Three Important factors of strength of any cryptographic key are:

a. Key length:

Longer keys provide stronger encryption. It makes harder to sport patterns in the cipher text.

b. Key Management policies:

Store and manage the encryptions keys are very important.

c. Nature of Encryption Alogrithm

-----------------------------------------------------------------------------------------------------------------------------------------------------

2. Three things related to McCumber model are:

a. Properties: Availability, confidentiality and integrity

b. Safeguards: Human factors, policies

c. state of information: Transmission and storage processing

-------------------------------------------------------------------------------------------------------------------------------------------------------

4.

Social Engineering:

1. It is a art of manipulating people, to get some confidential information.

2. Criminals use social engineering tactics because it is easier to trust anyone and get information.

3. Types of social engineering attacks are:

a. Baiting

b. Spear Phising

c. Phising

d. Pretexting