T. Andrew Yang

Email: yang@uhcl.edu

Web: https://sceweb.uhcl.edu/yang/

Tel.: (281) 283-3835

Last updated:

 

8/19/2024: first posted

CSCI 5233

fall 2024


 

Note:
When composing your answers, make sure you give the original author(s) the necessary credits if your answer contains information from sources other than your own brain. Refer to http://sceweb.uhcl.edu/yang/citing.htm if more information is needed about proper citing. Directly copying information from web pages or ChatGPT is plagiarism and a violation of UHCL’s academic honesty policy.



Lab 1

Total: 100 points

1.      (10 pts) Visit the class discussion group in the Canvas. Post a message, in the forum ‘self-intro’, with your full name as the subject line. In your post, briefly introduce yourself, including your full name, your major, and one or two items that you most desire to learn in this class. Throughout this class, you shall regularly participate at the discussion group to find recent announcements, reminders, and discussions.

 

2.      Refer to http://sceweb.uhcl.edu/yang/citing.htm to refresh your memory about how to cite published information and give credits to the original authors and/or sources. Use either direct quotations or re-paraphrasing when answering each of the following questions.

Note: Not all information published on the web are correct; not all information generated by ChatGPT are correct either. Discern the validity of the information you use by, for example, comparing them with what you have learned from the textbooks and the class discussions.

2.1.   (10 pts) What are replay attacks?

2.2.   (10 pts) What are man-in-the-middle attacks?

2.3.   (10 pts) Explain the relationship between replay attacks and Denial of Service (DoS) attacks. Hint: How would the hacker use replay attacks to cause Denial of Service?

2.4.   (10 pts) Explain the differences between replay attacks and man-in-the-middle attacks. Hint: They are different types of attacks.

 

3.      The context: In a cloud-based document sharing system, the users may a document with a selected set of other users.

Based on what you have learned in class about security services, answer the following questions.

3.1.   (10 pts) Explain what data integrity means in this context.

3.2.   (10 pts) Explain what origin integrity means in this context.

3.3.   (10 pts) Explain what availability means in this context.

3.4.   (10 pts) Explain what confidentiality means in this context.

3.5.   (10 pts) Explain what non-repudiability means in this context.

 

Go to the Index


Lab 2

Total: 100 points

1.      Review how the Euclid Algorithm works by entering two integers, say 120 and 49, as the two input numbers using the online gcd calculator at https://www.calculatorsoup.com/calculators/math/gcf-euclids-algorithm.php.

 

2.      (10 pts) Use the Extended Euclidian Algorithm (EEA) to find the values of x and y for the equation 120x + 49y = 1. Show the intermediate steps. NOTE: Always verify the derived values to ensure that they’d satisfy the given equation. When necessary, switch the values of x and y in order to get the correct values.

 

3.      RSA key-pair generator

3.1.   (5 pts) Given two prime numbers, p = 13 and q = 7. The first step of generating an RSA key-pair is to calculate the values of n and totient(n). Show how the two values are calculated.

3.2.   (5 pts) Given n and totient(n), the public key (e) is selected, by making sure e < n and gcd(e, totient(n)) = 1. Can the number 27 be selected as the public key of this key pair? Justify your answer.

3.3.   (5 pts) Show the first 10 numbers in the set of potential public keys.

3.4.   (10 pts) Let the public key e be 77. Solve ed mod totient(n) = 1 to determine the private key d. Show the detailed steps. Hint: Use EEA to solve ex + totient(n)y = 1 first. NOTE: Always verify the derived private key by checking whether it would satisfy the original equation.

3.5.   (5 pts) What is the RSA public key and what is the RSA private key?

 

4.      (10 pts) There exist dependency relationships between security mechanisms. Those relationships are part of the prerequisites of deploying a given technology. For example, the digital certificates mechanism (e.g., X.509) depends on the Digital Signatures mechanism. Explain why digital certificates depend on digital signatures, and what are implied by such a dependency (with respect to deploying digital certificates in a computer system).

 

5.      Suppose a protocol is designed to enable secure transmission of a session key from a user to another user (in order to establish a secure session between the two). When Alice wants to send a session key to Bob, the key is to be encrypted with Bob’s public key, and the encrypted key will then be decrypted by Bob using his private key.

5.1.   (10 pts) What security service(s) would be provided by this protocol. Justify your answer.

5.2.   (10 pts) Revise the given protocol in order to provide confidentiality, data integrity, and origin integrity. Show the detailed steps of your revised protocol. Note: Clearly show which entity performs which operation in the protocol. You may draw a diagram to illustrate the protocol.

6.      SSL/TLS Certificates: Suppose there exists an online company (C), and a customer (A) has visited C’s online shopping site. To earn the customers’ trust, C has a TLS certificate installed on its webserver.

6.1.   (10 pts) Explain how C’s certificate would be created. By whom? Draw diagrams if necessary to enhance your explanation.

6.2.   (10 pts) Explain how C’s certificate would be verified by A’s browser.

6.3.   (10 pts) Suppose H has taken C’s certificate and manually changed the subject information in C’s certificate from C to H. Would this modification be detected by A during the certificate verification process? Justify your answer.

 

Go to the Index


Research Project

Research topic: The security of generative artificial intelligence: A survey of the challenges and the benefits

-        Investigate the current relationship between cybersecurity and generative AI (or GAI) from two perspectives.

a)      Frist of all, would GAI helps to enhance cybersecurity? Why or why not? Any specific case studies or experiments?

b)     Secondly, would the generative AI technologies be the target of cyber threats? How? Any specific case studies or example attacks?

 

Note 1: This is an individual project.

Note 2: Make sure you properly cite the work of other researchers or professionals. Visit http://sce.uhcl.edu/yang/citing.htm for more information about cited references. Warning: Missing or improper cited references in your draft paper and/or the final report will result in poor score for your research project. Do either quotations or re-paraphrasing properly in your paper. Copying multiple sentences or paragraphs from publications or online pages is NOT a proper way of citing others’ work.

The goal of this project is for you to visit refereed publications (as well as some relevant web sites) to perform a detailed investigation of the research topic. The University Library has online databases that could be used as a starting point of your literature search.

 

Items to be submitted:

 

The draft paper (including at least an abstract & initial literature survey)

The draft paper should be 1-2 pages long (single-spaced), and contains the following sections:

o   Research topic

o   Your name and an email address that you check regularly (that is, at least once a day)

o   Class name

o   The abstract of your paper, including a general description of the topic and what you plan to accomplish in the final paper

o   Survey of related work: Discuss at least three articles related to your chosen topic.

o   A tentative outline (agenda) of your final report. That is, the sections/subsections that you plan to include in the final paper.

 

To submit the draft paper:

a.      Create a thread in the Canvas discussion board (with the subject line “Draft paper: <your full name>”) and post your draft paper in that thread. Check the syllabus for the due date.

b.      In addition, submit your abstract in Canvas’s assignments page.

 

Online reviews of others’ draft papers

Review at least five draft papers posted by your classmates. NOTE: This task should be completed within one week after the draft paper’s due date.

 

The final paper

The final paper should be 5-10 pages long (single-spaced), and include your findings about the chosen topic.

The following is a suggested outline of your final report:

Title

Your name (and email address)

An abstract (50-100 words)

Introduction to the topic

Significance of the chosen topic with respect to this course

Survey of related work

Implemented demonstrations, if applicable

Your findings

Future work: research ideas and projects related to the topic

Conclusion

Appendix (if any)

 

To submit the draft paper:

a.      Create a thread in the Canvas discussion board (with the subject line “Draft paper: <your full name>”) and post your draft paper in that thread. Check the syllabus for the due date.

b.      In addition, submit your abstract in Canvas’s assignments page.

 

Warning again: Missing or improper cited references in your draft paper and/or the final report will result in poor score for your research project.

Go to the Index