Question 1:
Modification: Cryptographic countermeasures to this attack include use of data hashing, signing and digital signatures
: This attacks can be prevented by authenticating users using the communication channel.
Question 2:
Question 3:
An offline brute force attack is more dangerous it easier to perform than an online attack and stands a better chance of going undetected.
ii). A dictionary attack is an attempt to gain unauthorized access to a computer system by the use of a very large set of words in the generation of potential passwords. Offline dictionary attacks can happen when the attacker selects passwords from the dictionary and tries to generate responses that matches the recorded one. This process is repeated over and over until a successful attempt is made.
Question 4
Question 5:
Paper 2
1 (a) (i) an active on-path attacker-modification, fabrication, sinkhole, Sybil, spoofing
(ii) A passive on-path attacker-Eavesdropping, traffic analysis
(iii) An active off-path attacker- modification, fabrication, denial of services, wormhole
(iii) A passive off-path attacker-Eavesdropping, traffic analysis.
1(b) (i) IP and UDP;
Both are transport layer protocols and they allow for application to application delivery
PROTOCOL |
Similarities |
Differences |
IP and UDP |
-Both are stateless, connectionless protocols. -neither of both IP and UDP provides a reliable channel |
-UDP resides on the transport layer while IP resides on internet Layer |
TCP and UDP |
– Both are transport layer protocols and they allow for application to application delivery -Both TCP and UDP headers includes source and destination port numbers -Both TCP and UDP encapsulate transport layer PDUs |
-TCP provides a reliable Service while UDP does not -TCP has error checking functionality while UDP does not have -TCP is connection oriented while UDP is connectionless |
WEP and WPA |
-In WEP data integrity is provided through CRC-32 while WPA it is provided through message integrity code -In WEP encryption is achieved through Rivest Cipher 4(RC4) while in WAP Temporal Key Integrity Protocol(TKIP) is used for data privacy(Encryption) |
|
WPA and WPA2 |
-They both use the 4 handshaking mechanism which is used for providing the key management. |
-WAP is possible in deploying to both current and previous hardware’s while WAP2 is only possible to be deployed in newer hardware’s and those with NIC that is not older than 2006 -data integrity is provided through message integrity code while WAP2 is provided through Cipher block Chaining Message Authentication Code(CBS-MAC) |
TCP Authentication Option and IPsec Authentication Header |
-They are both derived master key tuple (MTP). |
-TCP-AO uses the TCP options in providing the message authentication while AH is used for providing integrity services. |
IPsec Authentication Header and IPsec Encapsulating Security Payload |
– Both provides data origin authentication and data integrity services |
AH protocol uses sequence numbers to detect replays while ESP uses symmetric encryption and MACs based on secret keys that are shared between endpoints. |
DNS is the Domain Name System that is used for providing a structured way that is used in naming internet resources, also another purpose is maintaining a map between the internet protocol addresses and the domain names assigned and Lastly is that the browser may use DNS in determining the IP address of specific web server for a given Uniform resource Locator. The sender may use DNS in determining the IP address of the recipient’s name server from the receiver email address.
DNS query-response protocol – DNS offer provision of a request response protocol that enables the hosts in requesting the ip addresses for any known domain name. This Response protocol must have an identifier which will enable the requester to match the responses to the required requests. NB. It’s good to note that DNS requests and the responses are always encapsulated in the UDP datagrams
The Resolvers are used to run the protocols.
Fabrication attack (Cache Poisoning)
(ii) if attacker is successful to alter the mapping domain name to a chosen IP address this will mean a successful cache poisoning where the stub resolver is considered to use a corrupted recursive resolver and the IP datagrams that were constructed by the stub resolver will now have to be sent to IP addresses that the attacker want or had chosen. This will mean that an attacker is on the path and therefore termed to be very much more powerful
2(a) as we all know that the public internet is largely based on IPV4 whose addresses are 32 bits long. If we consider an example of Classless Inter-Domain Routing (CIDR) block to have the form a.b.c.d/n of which a, b, c and d are decimal numbers between 0 & 255 and n is a two digit decimal number between 0 and 32.
(b) (i) the difference between the private IPV4 addresses and Public IPV4 addresses is that the private IP-range cannot be routed over the internet while in the public IPV4 ISPs allows routing on the public internet
(ii) Private IPv4 was introduced in RFC 1597 for the purpose of address allocation for private internets.
(iii) This is because it will be impossible in distinguishing hosts with same IP address
(c) Network Address and Port Translation (NAPT) makes use of port numbers to distinguish between hosts with private IP addresses where in minds we know all the TCP and UDP datagrams always have a port number. There is mapping between the source private address and the source port number to a virtual port number with the use NAT device. This will the incoming datagram, to be matched to a private IP address and port number using the destination port number that is virtual in look-up table.
The technique is an IP tunneling that modifies IP datagrams as they try to pass through a gateway. Since IP tunneling works by encapsulating where the gateway at the edge of the source network encapsulating the IP datagram in an outer datagram. In providing the confidentiality the gateways must encrypt and decrypt the encapsulated IP packets where in this manner we can provide the confidentiality service and the integrity of the data built on a virtual private network. This is often made possible by implementation of IPsec and IKE by gateways in negotiating security associations and controlling which datagrams are to be processed using IPsec.
(d) IP spoofing is the underlying cause of a significant proportion of the security problems associated `with the Internet because all transport and application layer messages are encapsulated in IP datagrams.
(e) The aim of smurf attack is to exhaust processing resources of any victim by forcing it to processing the ICMP messages. The following example shows the working of a smurf attack.
The attack encapsulates echo requests in a spoofed IP datagram. The attacker M sends ICMP requests to B that appear to come from the victim’s IP address By doing this repeatedly, M can cause A to be flooded by ICMP echo reply messages causing a denial of service
(f) Ingress filtering is known as RFC 2827 attempts reducing of IP spoofing by identifying and dropping packets that have been spoofed by inspecting the source address.
In egress filtering prevention of IP spoofing which is known as RFC 3013 the IP datagrams sent to a customer should be filtered in that the destination address in the customer’s range of IP addresses. In this case a datagram should be dropped if that source address belongs to the customer’s range of IP addresses. Lastly is the Reverse Path Forwarding which is known as RFC 3704 and is termed to be a more complex form of ingress filtering? Routes between two Internet hosts are not necessarily symmetrical. This is particularly true for hosts in multi-homed ASes. In this case, RPF examines each possible interface on which a datagram could be forwarded The datagram is dropped if none of these interfaces match the one on which the datagram was received
3 (a) These are techniques that can be used to prevent and detect problems that arise in network communications.
(b) The procedure below explains how the stop-and-wait protocol in constructing communications channels that are reliable.
The stop-and-wait protocol provides a reliable of a one-way channel where the sender transmits an acknowledgement if the message has arrived and the checksum has been verified. The sender must wait for an acknowledgement before he or she sends the next package or message. We note that no acknowledgement will be received if the message is not received. If there is no acknowledgement is received during the time given then the sender will have to re-transmit the message again. The stop-and-wait protocol guarantees delivery (and the messages are received in order because they are sent one at a time).
(c) The sender transmits a synchronization message to the receiver with an initial sequence number. The receiver returns an acknowledgement which includes the initial sequence number
The acknowledgement has the effect of confirming that both sender and receiver know the initial sequence number the initial sequence number is an example of shared state once the sender receives the acknowledgement it will send the first message containing application data using the next sequence number
(d) The poor design and implementations of important protocols have led to many security breaches where Lack of origin authentication in IP has led to denial-of-service attacks against innocent hosts
(e) The use of SYN cookies means that some information that would normally held in the half-open connections table is lost. The table would record other parameters used in a TCP connection, such as window size. Hence there are some (minor) limitations on the type of TCP connections that can be established using SYN cookies However, SYN cookies do mean that a server can continue to operate even when there is a SYN flooding attack. TCP Cookies Transactions is an extension of SYN cookies (RFC 6013).TCPCT avoids the limitations of SYN cookies but it requires the initiator and responder to support TCPCT
SYN cookies are used in the IKE handshake to render certain kinds of denial-of-service attacks ineffective roughly speaking, the first two messages in an IKE handshake are stateless. The responder only commits resources to an IKE handshake once an appropriate response to the SYN cookie has been received
4 (a) The entity authentication requires the data origin authentication to confirm the identity that is provided by the MAC where freshness prevents replays of old authentication messages (provided by using a different ISN for each run of the protocol. In this context of entity authentication, the ISN is usually called a nonce (a number used once). This entity authentication protocols are often known as challenge-response protocols. The verifier sends a nonce to the c12
(b) If an attacker M wants to impersonate A to B, M first runs the protocol with B in order to obtain the current challenge, n say, from which M deduces the next challenge, n + 1. The attacker then runs the protocol a second time, this time with A and pretending to be B. During this protocol run, M chooses n + 1 as his challenge to A. A, an honest protocol participant will encrypt n + 1 using the key she shares with B. Finally, M runs the protocol a third time, this time with B and pretending to be A. When B sends the expected challenge, n + 1, M replays the value received from A in the previous run of the protocol. Hence, M is able to trick B into believing that he is communicating with A. Note that this attack works whenever B uses a predictable method of generating n.
The trouble with an 128-bit challenge is that, even if it is chosen at random, it will repeat rather quickly, thus giving B the opportunity to replay the response to an earlier challenge.
(c) This is because the CRCs and steam ciphers do not mix where RC4 XORs is the keystream with the plaintext. When there is change in the plaintext means that the ICV field (computed
Using CRC-32) is incorrect. The structure of CRC-32 means that it is possible to predict the effect on the ICV of a bit changing in the plaintext. The attacker can modify the encrypted ICV for the modified plaintext, in such a way that the modified ICV is the CRC-32 value
for the modified plaintext. In other words, the attacker can fool the recipient into believing a
modified message is the one that was sent.
(d) Example
In the case of private-public key pairs, it is impractical to use asymmetric cipher systems for bulk encryption. Thus we often use asymmetric cryptography only to establish a shared secret.
(e) The idea is to ensure that successful password guessing requires the attacker to be on-line, rather than off-line. The generic design of an EKE protocol uses
(f) Suppose the attacker tries to guess the password (and hence Kir ). Then the decryption of messages 1 and 2 only reveals DH values and the attacker has no way of knowing whether these are the DH values chosen by the initiator and responder. Alternatively, the attacker can try to guess k, but this only works for a particular run of the protocol (and has a very low chance of success in any case).
Of course, the attacker can try an on-line attack by impersonating I, guessing Kir and selecting x. If the attacker guesses Kir correctly then he will be able to recover gy and compute k = gxy . However, the attacker has no way of determining whether he has guessed Kir correctly without completing the protocol run. (If he has guessed correctly, then he will be authenticated as he will be able to compute the correct response in message 4.) However, if the number of attempts to run the authentication protocol is limited to a very small number (typically less than five), then the likelihood of the attacker correctly guessing the password and completing the protocol run successfully is negligible (even for weak passwords).
5 (a) Generating the TLS (Record) PDU
(b) Processing the Record PDU
It’s good to note that the SSL/TLS software at the receiver side should receive Record PDUs in exactly the same order as they were produced because TCP is reliable .This means that the sender and receiver can maintain independent, synchronized copies of the (TLS) sequence number used in the MAC computation then Hence, the recipient Decrypts the Record PDU (recovering the application data and the MAC)
The recipient will “tear down” an SSL/TLS connection if MAC verification fails
(d) The idea behind this is that the HTTP and BGP will be used in specifying the application interaction with network. It does not matter whether sequence numbers are encrypted or not. Why? Sequence numbers have no intrinsic value, so confidentiality is not required and they don’t need to be encrypted. Sequence numbers are only relevant to end devices, not intermediate devices, so they can be encrypted. Sequence numbers must be integrity protected. Why? If sequence numbers can be modified, the data chunks may be reassembled in the wrong order.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download