Study Guide for Midterm
This is simply a guide of topics that I consider fair game for the
midterm. I don't promise to ask you about them all, or about any of
these in particular; but I may very well ask you about any of
these.
-
Ethics and Law
-
Exporting cryptographic programs, enciphered messages
-
Ethical and legal problems of break-ins
-
License to hack
-
Cryptography
-
Types of attacks: ciphertext only, known plaintext, chosen plaintext,
chosen ciphertext
-
Types of ciphers: substitution, transposition, product (both
substitution and transposition)
-
Goal of ciphers; what makes a cipher theoretically unbreakable
-
Caesar cipher, Vigenere cipher, one-time pad
-
What the DES is, characteristics
-
Public key cryptosystems
-
RSA
-
Confidentiality and authentication with secret key and public key systems
-
User and System Authentication
-
One-way hash functions (cryptographic hash functions)
-
UNIX password scheme, what the salt is and its role
-
Challenge-response schemes
-
Attacking authentication systems: guessing passwords, spoofing system,
countermeasures
-
Access Control
-
multiple levels of privilege
-
UNIX protection scheme
-
ACLs, capabilities, lock-and-key
-
MULTICS ring protection scheme
-
MAC, multilevel (military) security model
-
Differences between MAC, DAC, ORCON
-
Bell-LaPadula model
You can also see this document as a
Binhex Framemaker version 5 document,
Postscript document,
or a
plain ASCII text document.
Send email to
cs153@csif.cs.ucdavis.edu.
Department of Computer Science
University of California at Davis
Davis, CA 95616-8562
Page last modified on 2/8/97