Homework 2
Due Date: February 2, 1999
Points: 200
- (20 points) Consider an RSA system in which p = 97, q =
109, and e = 865. Please determine the ciphertext corresponding to the
messages M = 124, M = 506, and M = 321.
- (20 points) An iteration attack on the RSA cipher is one in
which repeated encipherings of the ciphertext produce the plaintext. Consider
the ciphertext C = 3, n = 25, and e = 17. Please show that
this message can be broken with the iteration attack.
- (20 points)A protected subsystem is a subject that is invoked
by other subjects, and acts on their behalf. It is typically constrained, so
that it can alter local variables and parameters, but nothing else (including
other global information). Please extend the access control matrix model
discussed in class to allow for the explicit existance of protected subsystems.
To enter a protected subsystem S, use the primitive enter
S with parameters (o1,
r1), ..., (on, rn),
where oi is an object that the subsystem can access and
ri the set of rights that the subsystem may use to access
oi; to exit the protected subsystem, use the primitive
exit S with parameters (o1,
r1), ..., (on, rn).
In your answer, define each of these operations in terms of the
changes they induce on the access control matrix at the time of entry and of
exit.
- (40 points)This question uses the Take-Grant model. Consider a graph
G0 with two subjects x and y connected by
a path composed
of one or more objects with only take and grant edges between
them. In G0, y has [[alpha]] rights over an object
z.
Prove from the definition that can*share([[alpha]], x,
z, G0) is true if, and only if, the path between
x and
y is a bridge. (Note: you may not use
Theorem 6.12. Hint: Consider using induction on the length of the
path between x and y.)
- (30 points) Consider the following situation: a site security policy
states that: (1) it includes all general rules of conduct for the college; and
(2) each user's account is private. Tom, a student in a literature class,
turned in a paper on Aristotle's Ethics. His teacher, Jenny, remembered
that another student, Anna, had turned in a very similar paper a year ago,
when she last taught the class. Jenny logged into the computer system and
looked in the publicly readable areas of Anna's account. Jenny found the exact
same paper. Jenny referred the student to the university disciplinary committee
for plagiarism. Both Anna and Tom filed charges against Jenny, arguing that she
had no right to look in Anna's account without permission.
- Assume that the college's overall policy forbids plagiarism, either by
copying or by allowing copying to occur. By this standard, should Tom and/or
Anna be held guilty of violating the security policy (and the college's policy
against plagiarism)?
- Did Jenny breach security at any time during this incident?
- What do you think should happen to all parties, and why?
(Note: This incident is fictionalized a bit, but really happened
- no, not at UC Davis!)
- (70 points) This continues our penetration testing of lassen.
In the last exercise you hypothesized flaws in the system's networking
implementation. Now it is time to test them!
- In each of your three vulnerability descriptions was a short item about how
to test for the vulnerability (at least, there was supposed to be!)
Expand each of these into a full description, as follows:
your name;
server with the vulnerability;
how to verify the vulnerability in the absense of source code (if an
"attack program" is required, you may use pseudocode to describe
the attack program). Be very detailed here; what would "correct"
behavior be, and what
would erroneous behavior be? If you did this in the previous assignment, you
may repeat it here, but please be sure that any competent programmer could
reproduce what you plan to do.
effects of exploiting the vulnerability; would you gain access? would you
simply deny service or affect the response speed?
disruptions caused by exploiting the vulnerability: would you interfere with
normal use of the network? Could you accidentally (or intentionally) interrupt
or disrupt others' use of the network, or others' systems?
Please post your description to the newsgroup ucd.class.ecs253.d. Also,
as your classmates post this information, please consider their posts and see
if they suggest other vulnerabilities or exploits. Post that, too.
- If possible, check to see if the vulnerability exists. Act ethically -
if disruptions could occur other than to the users of lassen, don't launch the
attack!!!
Extra Credit
- If messages are enciphered using the RSA system, determined for the modulus
n = pq (where p and q) are primes, and the public
key is e, then there are (1 + gcd(e-1,p-1))(1 +
gcd(e-1,q-1)) messages that are unconcealable
(i.e., the ciphertext is the plaintext message itself). Please
prove this theorem.
- Consider the set of messages that are idempotent in the set
Zn (that is, m2 = m mod n).
Please prove that the ciphertexts corresponding to these messages in an RSA
system with modulus n are the
messages themselves, regardless of the choice of public key.
You can get this document in
ASCII text,
Framemaker+SGML version 5.5,
PDF (for Acrobat 3.0 or later),
or
Postscript.
Send email to
[email protected].
Department of Computer Science
University of California at Davis
Davis, CA 95616-8562
Page last modified on 1/24/99