T. Andrew Yang

Email: yang@uhcl.edu

Web page : http://sce.uhcl.edu/yang/

Tel.: (281) 283-3835

last updated:

 

1/28/2012

 

CSCI 5233 Computer Security& Integrity



Lab 1

1.1 (10 pts) Visit the class discussion group (link available in the syllabus page). Post a message with your full name as the subject line. In your post, briefly introduce yourself (including your full name) and one item you most desire to learn in this class. Throughout this class, you shall regularly participate at the discussion group to find recent announcements, reminders, and discussions. 

1.2  Java Cryptography
If you have not done so, you may want to download the most recent Java Development Kit from http://java.sun.com/j2se/ (for example, JDK 6.0).

Review information in the file “Installation of JCE security provider for unlimited strength security, and become familiar with JCE security providers and the unlimited strength Java security policy. Please note that the instructions given in the document have been rigorously tested and, if followed correctly, should enable your Java environment to run all the sample programs that come with the 'Java Security' book. If you run into problems, double check and make sure you have correctly completed the required steps.

Note: Sample programs from the book are available on line at http://sce.uhcl.edu/yang/teaching/proJavaSecurityCode.html. A zip file is available at the top of that page for you to download all the sample programs.

After you have properly configured your Java environment, perform the following tasks:

1)     (15 pts) Test the FileEncryptor.java program (from chapter 4 of the Garms and Somerfield book). Add a printline statement at the beginning of the program to print your name as part of the program’s output. Run the program using sample data of your choice. Note: Replace all occurrences of the cipher ‘PBEWithSHAAndTwofish’ with ‘PBEWithMD5AndDES’ in the source program.

Hand in the revised source program and the screen output from the program.

2)     (continued from a above, 15%) Give the TA a demo during his office hours before the due date.

3)     (15 pts) Test the FileEncryptorRSA.java program (from chapter 5 of the Garms and Somerfield book). Add a printline statement at the beginning of the program to print your name as part of the program’s output. Run the program using sample data of your choice. Note: Replace all occurrences of the cipher ‘PBEWithSHAAndTwofish’ with ‘PBEWithMD5AndDES’ in the source program.

Hand in the revised source program and the screen output from the program.

4)     (continued from c above, 15%) Give the TA a demo during his office hours before the due date.

 

1.3 The following questions are based on chapter-end exercises from the textbook.

5)     (10 pts) Exercise 1, Chapter 1 (page 25). Justify your answer. (That is, explain why your answer is correct.)

6)     (10 pts) Exercise 2, Chapter 1 (pp. 25-26). Justify your answer.

7)     (10 pts) Exercise 3, Chapter 2 (p.45).

 

Go to the Index


Lab 2

2.1 Study the textbooks and/or applicable web sites to find answers for the following questions. Online glossaries may also be used.

Note: Clearly identify the source(s) of your information.

1)     (5 pts) What is a ‘man-in-the-middle attack’?

2)     (5 pts) What is a ‘replay attack’?

3)     (5 pts) Is a replay attack a type of man-in-the-middle attack? Justify your answer.

4)     (5 pts) What is a ‘session hijacking attack’? When applicable, show the protocol or draw a diagram to illustrate the attack.

 

2.2 Programming project

5)     Description: All the programming projects for this class involve client/server communications using sockets. The purpose of this project is for you to become familiar with Java Sockets programming by running a sample application.

6)     Requirements: Run the KeyAgreement application in Chapter 5 of the Java Security book. The application consists of two Java programs (KeyAgreementClient.java and KeyAgreementServer.java).

7)     Compile and run both programs (as two separate processes).

8)     In your demo, show the TA how those programs interact with each other. Figure 1 shows a sample execution of the programs.

Figure 1. Demo of the KeyAgreeement application (original)

9)     Revise the KeyAgreementServer.java program, so each time the server program receives a NewLine character sent from the client, it will display a message like ‘Line n from the client: <the mesg>‘. See Figure 2 for a sample screen snapshot of a revised program.

 

Figure 2. Demo of the KeyAgreeement application (with revised KeyAgreementServer.java)

10)  (40 pts) In your demo, show the TA how those programs interact with each other.

11)  (40 pts) Zip the revised KeyAgreementServer program and the screen snapshot of running the revised application into a single zip file. Send the zip file electronically to yang@uhcl.edu, cc'ing the TA.

 

Go to the Index


Lab 3

 

3.1 (5 pts) Using the Extended Euclidean Algorithm, find x and y such that 31 x + 11 y = 1.

 

3.2 On page 252 of the Bishop book, a variation of man-in-the-middle attack in the context of public key cryptography is discussed, in which the hacker Eve successfully steals a session key transmitted from Alice to Bob. Examine the attack scenario and answer the following questions:

1)     (5 pts) What is the source of the problem? That is, what vulnerability makes the attack possible?

2)     (5 pts) Explain how the problem may be mitigated? Justify your answer.

 

3.3 (5 pts) Exercise 1, Chapter 9 (p.241).

 

3.4 Programming project

1)     Project description: The purpose of this project is to build a client/server application which uses symmetric encryption to exchange a new key. The application will be used as a base for the later projects. The communication between the client and the server is to be implemented as sockets.

2)     Requirements

a)    The client application will take a plaintext message (m) from the user, encrypt the message using a TripleDES key (assuming an existing key, k), and then send the ciphertext over the socket to the server. NOTE: The key may be generated by the client program, stored into a file, and then shared with the server program.

b)    The server will read the ciphertext from the socket, get the secret key k from the user, and then decrypt the ciphertext. The decrypted message (dm) should be printed as part of the screen output.

c)     The server then generates a new TripleDES key (nk), encrypts dm by using nk, encrypts nk by using the existing symmetric key (k), and then sends the encrypted new key and the encrypted dm over to the client.

d)    Once the client receives the encrypted dm and the encrypted nk, it first decrypts the encrypted nk to get the new symmetric key, and then uses the new key to decrypt the encrypted dm. The outcome from the decryption of dm should be compared against the original plaintext message (m), which was originally sent over to the server. Print appropriate message depending on the result of the comparison.

3)     Project Report (to be submitted electronically to yang@uhcl.edu, cc'ing the TA, as a single zip file)

a)    (20 pts) Program design

                                  i.          Use UML to define class diagrams for CLIENT, SERVER, and any other necessary classes. Clearly identify the attributes and methods defined in each of the classes, and the associations among the classes.

                                ii.          For each of the methods, briefly explain its functionality and clearly indicate its parameters (if any) and returned data type.

b)    (35 pts) Source programs and execution results

                               iii.          A copy of the class diagram (possibly refined from the preliminary report). If no revisions were done, simply attach the original UML diagram.

                               iv.          The source programs implementing your design.

                                 v.          A readme file explaining how to compile and run your source programs.

                               vi.          Test the application by using three different plaintext messages. For each of the test cases, attach a screen output showing the following:

1.     the original message (m),

2.     the ciphertext sent by the CLIENT (ci), 

3.     the decrypted message by the SERVER (dm), 

4.     the ciphertext sent by the SERVER (cs), 

5.     the decrypted message by the CLIENT (dmc),

6.     The result of the CLIENT’s comparing m and dmc.

c)     (25 pts) Program demonstration: You are required to give the TA a demo of your final project during his/her office hours. The demo shall be completed before the project due date. The demo constitutes 30% of the project’s total grade.

 


Go to the Index

Lab 4

 

4.1 (10 pts) Exercise 2, Chapter 9 (p.241). Explain your approach.

 

4.2 (10 pts) Exercise 6, Chapter 9 (p.241)

 

4.3 (50 pts) Exercise 8, Chapter 9 (p.242). Show all the intermediate steps.

 

4.4 Exercise 17, Chapter 9 (p.243)

4.4.1 (10 pts) The explanation

4.4.2 (10 pts) The modified protocol

 

4.5 (10 pts) Exercise 2, Chapter 10 (p.273)

 


 

Go to the Index

Lab 5

 

5.1 The questions below are based on the ‘signature chain' discussion on page 258 of the Bishop book. Suppose that X<<Y>> represents the certificate that X generated for the subject Y (X is the CA that issued the certificate). It is assumed that a subject always has the public key of its root CA, but not necessarily its immediate CA.

a)    (5 pts) Suppose Y has generated a certificate for Z. How does Z’s certificate look like?

b)    (5 pts) (Continued from above) When Z sends its certificate to another entity R, how would R verify that certificate? Explain in detailed steps how the verification would work. Assumption: The only trusted public key that R has is X’s public key.

c)     (10 pts) Suppose P’s certificate is created by O, and Q’s certificate is created by P. The only trusted public key that Q possesses is O’s public key. Show how cross-certification may be implemented between X and O such that, when Q receives Z’s certificate, Q will be able to verify that certificate.

d)    (10 pts) (Continued from above) Show in detailed steps how Q would verify Z’s certificate (when cross-certification between X and O is in place).

 

5.2 Programming project

1)     Project description: The purpose of this project is to create multi-level certificate paths (aka. certificate chains), and use a sample program to verify the certificate paths.

2)     Requirements:

a)    Perform the following tasks to familiarize yourself with the basic tools and information with respect to multi-level certificate chaining.

b)    Refer to http://java.sun.com/javase/6/docs/technotes/tools/windows/keytool.html to learn how to use keytool to create self-signed certificates.

c)     Study the sample program, SignCertificate.java, which can be used to allow one entity to sign the certificate of another entity. The program is discussed in Chapter 6 of the Garms and Somerfield book; see http://sce.cl.uh.edu/yang/teaching/proJavaSecurityCode/Chapter6/SignCertificate.java for the source codes.

d)    A document explaining how to create multi-level certificate paths is available as Creating Certificate Chain.doc. Practice the examples in that document to learn how to create multi-level certificate paths.

 

e)     Use keytool to create the following certificate chains. Use proper names and relevant information for each of them.

f)     Create the certificates of the following certifying authorities: rootCA, CA1, and CA2. CA1 and CA2 are certified by rootCA.

g)    Create certificates for the Server and the Client applications. The Server (S) is certified by CA1; the Client (C) is certified by CA2.

h)    Use RSA when generating the key pairs for the server, the client, and the CAs.

i)      (40 pts) Show the commands you have issued to create the certificates for the Server and the Client, and the screen snapshots showing the content of the certificate paths for Server and Client, which you created in step 7 above. (This part should be submitted electronically to yang@uhcl.edu, cc'ing the TA, as a single zip file.)

 

j)     To learn how to process multi-level certificate paths in your Java programs, unzip and run this sample application.

k)    (30 pts) Give the TA a demo during his/her office hours to show that you are able to run the sample application in step 9 above.  The demo shall be completed before the project’s due date.


Go to the Index

Lab 6

6.1 Programming project

1)     Project description

The goal of this project is to extend the FileEncryptorRSA program (pages 98-110 of the Garms book) into a two-user application, incorporating certificates and digital signatures.

2)     Requirements

3) Certificate Chaining: Use keytool to create the certificates of four certifying authorities, including rootCA, CA1, CA2, and CA22. Use proper names and relevant information for them. Also create certificates for the server and the client applications. Use RSA when generating the key pairs for the server (S), the client (C), and all the CAs.

a)    The server is certified by CA1.

b)    The client is certified by CA22, which is certified by CA2. 

c)     Both CA1 and CA2 are certified by rootCA; rootCA’s certificate is self-signed.

4)     The Server (i.e., the encryptor/sender)

a)    The server’s certificate should be signed by its CA, as specified above (certificate chaining). Then, the server can either send its certificate to the client or save it in a keystore, which is then shared with the client.

b)    The server should get the client’s public key from the client’s certificate.

c)     The server needs to verify the client’s certificate.

d)    If the verification succeeds, the server retrieves the client’s public key from the certificate. Otherwise, an appropriate error message should be displayed.

e)     The server should generate a 256-bit Blowfish session key (sk), which is to be used to encrypt a data file. Use this sample data file when testing your program.

f)     For the purpose of data and origin integrity, the server will generate a digital signature (ds) based on the content of the data file. That is, the content of the data file is the message used by the server to generate the digital signature.

g)    The session key itself (sk) will be encrypted by the client’s public key (for confidentiality), resulting in an encrypted session key (esk).

h)    The encrypted session key (esk), the digital signature (ds), and the encrypted data file (edf) are then sent to the client.

5)     The Client (i.e., the decryptor/receiver)

a)    The client’s certificate should be signed by its CA, as specified above (certificate chaining). Then, the client can either send its certificate to the server or save it in a keystore, which is then shared with the server.

b)    The client should get the server’s certificate and verify it.

c)     If the verification succeeds, the client retrieves the server’s public key from the certificate. Otherwise, it displays an appropriate error message.

d)    Once receiving the data sent from the server (step 8 above), the client should first extract the encrypted session key (esk), the digital signature (ds), and the encrypted data file (edf).

e)     The client then uses its own private key to decrypt the encrypted session key (esk). The extracted session key (sk2) should be examined for its integrity, by using the attached MAC.

f)     If the data integrity of sk2 is not verified, the client should print an appropriate error message; otherwise, it uses sk2 to decrypt the encrypted data file.

g)    The client then verifies the digital signature (ds) using the server’s public key and the content of the data file.

h)    If the verification succeeds, the client will display the content of the file on the screen. Otherwise, it prints an appropriate error message.

6)     Testing Cases: Arrange three test cases as outlined below.

Case 1: Generate proper keyPair respectively for the server and the client. Run the programs so the content of the file sent by the server is displayed on the client’s screen. Use the sample data file mentioned above.

Case 2: Produce an error in the generation of the client’s certificate such that the verification performed by the server would fail. An example of such errors is that the client’s certificate is not signed by a proper CA.

 

7)     Project Report (Pack all items listed below into a single zip file, and then send the zip file electronically to yang@uhcl.edu, cc'ing the TA.)

a)    (20 pts) Program design

                                      i.         Use UML to define class diagrams for SENDER, RECEIVER, and any other necessary classes.

                                    ii.         Clearly identify the attributes and methods defined in each of the classes, and the associations among the classes.

                                  iii.         For each of the methods, briefly explain its functionality and clearly indicate its parameters (if any) and returned data type.

b)     (10 pts) Security analysis: Explain what security features are built into this application. For each of the features, explain how it is achieved in the application.

c)     (40 pts) Source programs and execution results

                                     i.         The source programs.

                                    ii.         The data file.

                                  iii.         Screen snapshots of using keytool to create the certificates.

                                  iv.         Screen snapshots of running the programs (showing certificate verification, MAC verification, signature verification, data file decryption, etc.)

d)    (30 pts) Program demonstration: Arrange time to give a demo for showing the testing cases to the TA before the project’s due date.

 


Go to the Index

Lab 7

7.1 (20 pts) Exercise 6, Chapter 10 (p.273).

 

7.2 (20 pts) Exercise 7, Chapter 10 (p.273).

 

7.3 (20 pts) Exercise 2a, Chapter 12 (p. 335).

 

7.4 (20 pts) Exercise 2b, Chapter 12 (p.335).

 

7.5 (20 pts) Exercise 10a, Chapter 12 (p.336).

 


Go to the Index