


Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Material Type: Assignment; Class: Tpc: Games; Subject: Computer Science; University: Wellesley College; Term: Spring 2004;
Typology: Assignments
1 / 4
This page cannot be seen from the preview
Don't miss anything!
Computer Science 349 Spring 2004 Due: Start of class on Thursday February 12 Reading: Singh, Chapters 2, 3; Stinson, Sections 1.1.3 -- 1.1.7, 1.2.1 – 1.2.2. Exercise 2.0. Read the article by Robert Lemos, “Psst … I known your password”, ZDNet News, May 22, 2002. URL: http://zdnet.com.com/2100-1105-920092.html and the article by Rob Shimonski, “Introduction to Password Cracking”, IBM developerWorks Hacking Techniques, July 2002. URL: http://www- 106.ibm.com/developerworks/security/library/s-crack. Experiment with John the Ripper (a.k.a. John) in an attempt to crack (some) passwords contained in a mock /etc/passwd file which may be downloaded from the course web page. Source code John may be found from http://www.openwall.com/john/. Program documentation is located at the same site as the program. Warning: Under no circumstances should you attempt to run John on password files other than those given in this assignment. By default, John uses the word list in password.lst in the same directory as the binary file. This is not a very extensive word list. You may want to combine it with a larger word list, such as the one in /usr/share/dict/linux.words. You might also want to include Wellesley-specific words, which you could potentially automatically generate from some documents about the campus. Note that John takes a long time to run (we’re talking days) – indeed, it may never terminate on its own and you may have to manually terminate it. A gold star goes to the student who cracks the most passwords. As a baseline, you will have to beat 15, which is how many I cracked after running the program for 10 minutes. Submit your list of cracked passwords and associated users accounts as the solution to this exercise. Did you recognize any of your own passwords?^1 Exercise 2.1. (Stinson 1.6) If an encryption function eK is identical to the decryption function dK , then the key K is said to be an involutary key. Find all involutory keys in the Shift Cipher over Z 26. (^1) The hash function used to create these accounts used only the first eight characters of your password. It was very bad of me not to tell you this in advance.
Cryptography Exercise 2.2. (Stinson 1.10) Suppose that K = (5, 21) is a key in an Affine Cipher over Z 29. a. Express the decryption function dK ( y ) in the form dK ( y ) = a’y + b’, where a’, b’ Œ Z 29. b. Prove that dK(eK(x)) = x for all x Œ Z 29. Exercise 2.3. In one of his cases, Sherlock Holmes was confronted with the following message: 534 C2 13 127 36 31 4 7 21 41 DOUGLAS 109 293 5 37BIRLSTONE 26 BIRLSTONE 9 127 171 Watson, still working his way through Holmes’s little monograph on codes and ciphers. was stumped. Fortunately, Holmes immediately deduced the type of cipher. Having read Chapter 2 of Singh, so can you. What is it? Exercise 2.4. Sherlock Holmes was not the first investigator to benefit from cryptanalysis. Some years before The Adventure of the Dancing Men was published, Mr. William Legrand, stumbled upon Captain Kidd's treasure map complete with skull and goat's head. The fact that the map was written in invisible ink presented some small problem: "I held the vellum again to the fire, after increasing the heat, but nothing appeared. I now thought it possible that the coating of dirt might have something to do with the failure: so I carefully rinsed the parchment by pouring warm water over it, and, having done this, I placed it in a tin pan, with the skull downward, an put the pan upon a furnace of lighted charcoal. In a few minutes, the pan having become thoroughly heated, I removed the slip, and, to my inexpressible joy, found it spotted, in several places, with what appeared to be figures arranged in lines. Again I placed it in the pan, and suffered it to remain another minute. Upon taking it off, the whole was just as you see it now." The figures, transcribed from the rudely drawn originals, appear below: The code is a simple substitution; apparently Captain Kidd didn't have a high opinion of his crew's cryptographic skills. Using the frequency table given in the text, can you figure out what it says? Warning: The resulting message is in English but may not make much sense on a first reading. It has a history.
Cryptography A simple substitution cipher was used. What is the encryption algorithm? How secure is it? To make the key distribution problem simple, both parties can agree to use the first or last sentence of a book as the key. To change the key, they simply need to agree on a new book. The use of the first sentence would be preferable to the use of the last. Why?