Homework 1 Solution

$35.00 $29.00

Part A: Written Exercises (40 points) (10 points) Read this online article from Ars Technica: https://arstechnica.com/gadgets/2021/03/attackers-are-trying-awfully-hard-to-backdoor-i os-developers-macs/ a. Say how the XCodeSpy attack relates to any of the CIA: confidentiality, integrity, availability. b. Say how the XCodeSpy attack relates to any of the STRIDE categories of threats. (10 points each) Provide 2 references to computer…

5/5 – (2 votes)

You’ll get a: zip file solution

 

Description

5/5 – (2 votes)

Part A: Written Exercises (40 points)

  1. (10 points) Read this online article from Ars Technica: https://arstechnica.com/gadgets/2021/03/attackers-are-trying-awfully-hard-to-backdoor-i os-developers-macs/

a. Say how the XCodeSpy attack relates to any of the CIA: confidentiality, integrity, availability.

b. Say how the XCodeSpy attack relates to any of the STRIDE categories of threats.

  1. (10 points each) Provide 2 references to computer security that you find in the

non-technical space. For each of the 2 references:

a. Provide or describe what is said.

b. (5 points) Say how it relates to any of the CIA: confidentiality, integrity, availability.

c. (5 points) Say how it relates to any of the STRIDE categories of threats.

  • Examples might be fiction, tv shows, movies, magazines, blogs, even news.

  • The reference may be technically correct or incorrect, or maybe you don’t know which.

  • Include the source – movie name and year; tv name, year, seasons#, episode #; URL, etc. If possible, give a link. A link to an entire movie is NOT useful although your graders would probably enjoy watching all of those movies.

Note: as always, please filter out obscenity and hatred for the learning community.

  1. (10 points) Draw an attack tree that describes a cheating student obtaining the answers to another student’s homework. Include all paths you can think of.

Part B: Hands On: Vigenère Ciphers (60 points)

As a “warmup” to C programming, we will have some fun and implement a simple form of encryption called Vigenère Ciphers. In addition to a C refresh, the goal is to explore the challenge of letter frequency in particular, and patterns in particular, for simple encryption algorithms.

  1. This programming exercise must be done in C. It will be a review or quick intro to C programming in a Linux environment.

  1. Turn in your source code and a makefile as attachments to your homework email.

  1. We will test and run your code on the Linux lab machines. If you want to work on those machines you can ssh to linuxlab.cs.pdx.edu. This machine name will switch you to a particular linux lab machine each time you login. Your home directory is the same across all machines.

  2. To learn what a Vigenere Cipher is, see Wikipedia Vigenère Cipher

Here is a table of the relative frequency of letters in English text:

  1. 8.167%

  1. 1.492%

  1. 2.782%

  1. 4.253%

  1. 12.702%

  1. 2.228%

  1. 2.015%

  1. 6.094%

  1. 6.996%

  1. 0.153%

  1. 0.772%

  1. 4.025%

  1. 2.406%

  1. 6.749%

  1. 7.507%

  1. 1.929%

  1. 0.095%

  1. 5.987%

  1. 6.327%

  1. 9.056%

  1. 2.758%

  1. 0.978%

  1. 2.360%

  1. 0.150%

  1. 1.974%

  1. 0.074%

Here is some plaintext:

ethicslawanduniversitypoliciestodefendasystemyouneedtobeabletothinklikeanattackerandthatinc ludesunderstandingtechniquesthatcanbeusedtocompromisesecurityhoweverusingthosetechniqu esintherealworldmayviolatethelawandtheuniversityscomputingpracticesormaybeunethicalyoumu strespecttheprivacyandpropertyrightsofothersatalltimesorelseyouwillfailthecourseundersomecirc umstancesevenprobingforweaknessesmayresultinseverepenaltiesuptoandincludingcivilfinesexp ulsionandjailtimecarefullyreadthecomputerfraudandabuseactcfaaafederalstatutethatbroadlycrimi nalizescomputerintrusionsthisisjustoneofseverallawsthatgovernhackingunderstandwhatthelawpr ohibitsyoudontwanttoenduplikethisguyifindoubticanreferyoutoanattorneypleasereviewcaenspolic

ydocumentonrightsandresponsibilitiesforguidelinesconcerninguseoftechnologyresourcesatpsuas membersoftheuniversityyouarerequiredtoadheretothesepolicies

  1. [12 points] What are the frequencies of the letters in the plaintext? Write a C program that reads in text from a file into a buffer, counts the occurrences of each [lowercase] letter of the English alphabet, and computes the relative frequencies. Your program should print out the contents of the buffer, and the frequency results in a simple list such as the one above.

  2. [12 points] Add a function to encrypt the plaintext with a Vigenere cipher and a given key. You should add the key as a command line argument so that you can enter a different key each time you run. A key is a text string of max length 4, min length 1.

  3. [12 points] Add the functionality to count the occurrences of each [lowercase] letter of the English alphabet in the ciphertext, compute the relative frequencies, and print out the ciphertext and the frequency results in a simple list.

  4. [12 points] Run your encryption program over the plaintext for two different keys: yz and wxyz.

  5. [12 points] Submit a table of your results, First column is the alphabet, second is the relative frequency of each, 3rd column is frequency from plaintext, 4th column is frequency from key yz, and 5th column is frequency from key wxyz.

  1. [no points, just wisdom, nothing to turn in] what happens to your program if the text in your file is too long to fit in the buffer? If you try to enter a key with length 5?

Homework 1 Solution
$35.00 $29.00