EXAM IN TTM4137 WIRELESS SECURITY

Similar documents
05 - WLAN Encryption and Data Integrity Protocols

Chapter 17. Wireless Network Security

L13. Reviews. Rocky K. C. Chang, April 10, 2015

AIR-WLC K9 Datasheet. Overview. Check its price: Click Here. Quick Specs

Chapter 24 Wireless Network Security

Communication and Distributed Systems Seminar on : LTE Security. By Anukriti Shrimal May 09, 2016

Security in IEEE Networks

Configuring WEP and WEP Features

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Link & end-to-end protocols SSL/TLS WPA 2/25/07. Outline. Network Security. Networks. Link and End-to-End Protocols. Link vs. End-to-end protection

Wireless Network Security

Csci388. Wireless and Mobile Security Access Control: 802.1X, EAP, and RADIUS. Importance of Access Control. WEP Weakness. Wi-Fi and IEEE 802.

The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0. Xirrus, Inc.

Wireless Security K. Raghunandan and Geoff Smith. Technology September 21, 2013

Network Encryption 3 4/20/17

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

Summary on Crypto Primitives and Protocols

Configuring Cipher Suites and WEP

BCA III Network security and Cryptography Examination-2016 Model Paper 1

Configuring a VAP on the WAP351, WAP131, and WAP371

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Hands-On Modern Mobile and Long Term Evolution LTE

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Cisco Wireless LAN Controller Module

CSCE 715: Network Systems Security

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Wireless Attacks and Countermeasures

Wireless LAN Security. Gabriel Clothier

Network Systems. Bibliography. Outline. General principles about Radius server. Radius Protocol

Securing Your Wireless LAN

3GPP security hot topics: LTE/SAE and Home (e)nb

Wireless Security i. Lars Strand lars (at) unik no June 2004

Stream Ciphers. Stream Ciphers 1

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

From wired internet to ubiquitous wireless internet

IPSec Transform Set Configuration Mode Commands

What is Eavedropping?

IPSec. Overview. Overview. Levente Buttyán

The security of existing wireless networks

Unit 8 Review. Secure your network! CS144, Stanford University

WPA-GPG: Wireless authentication using GPG Key

THOUGHTS ON TSN SECURITY

Link Security A Tutorial

IPSec Network Applications

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Exam Questions CWSP-205

CS 161 Computer Security

HW/Lab 4: IPSec and Wireless Security. CS 336/536: Computer Network Security DUE 11 am on 12/01/2014 (Monday)

The IPsec protocols. Overview

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Network Security: Cellular Security. Tuomas Aura T Network security Aalto University, Nov-Dec 2013

Temporal Key Integrity Protocol: TKIP. Tim Fielder University of Tulsa Tulsa, Oklahoma

Introduction and Overview. Why CSCI 454/554?

IPSec Transform Set Configuration Mode Commands

IPsec and SSL/TLS. Applied Cryptography. Andreas Hülsing (Slides mostly by Ruben Niederhagen) Dec. 1st, /43

COMP4109 : Applied Cryptography

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer

Wireless technology Principles of Security

LESSON 12: WI FI NETWORKS SECURITY

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013

Cryptography and Network Security

Appendix E Wireless Networking Basics

Wireless Security. Comp Sci 3600 Security. Attacks WEP WPA/WPA2. Authentication Encryption Vulnerabilities

Table of Contents 1 WLAN Security Configuration Commands 1-1

University of Agder Department of Information and Communication Technology EXAM

Wireless Communications and Mobile Computing

FAQ on Cisco Aironet Wireless Security

Wireless Network Security Spring 2015

Lab Configure Enterprise Security on AP

MACSec Security Service FIPS Validation. Richard Wang May 19, 2017 International Crypto Module Conference

Security+ SY0-501 Study Guide Table of Contents

Wireless# Guide to Wireless Communications. Objectives

Cipher Suite Configuration Mode Commands

Apple Inc. Apple IOS 11 VPN Client on iphone and ipad Guidance Documentation

ECHONET Lite SPECIFICATION. ECHONET Lite System Design Guidelines 2011 (2012) ECHONET CONSORTIUM ALL RIGHTS RESERVED

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Data Integrity. Modified by: Dr. Ramzi Saifan

Abstract of the Book

Message authentication codes

Data Sheet. NCP Secure Enterprise Linux Client. Next Generation Network Access Technology

This version of the des Secure Enterprise MAC Client can be used on Mac OS X 10.7 Lion platform.

Wireless Network Security

Release Notes. NCP Secure Enterprise Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3.

ISC2. Exam Questions CISSP. Certified Information Systems Security Professional (CISSP) Version:Demo

Release Notes. NCP Secure Enterprise Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3.

CSC 4900 Computer Networks: Security Protocols (2)

3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some

Contents. GSM and UMTS Security. Cellular Radio Network Architecture. Introduction to Mobile Telecommunications

Procedure: You can find the problem sheet on the Desktop of the lab PCs.

WiMAX Security: Problems & Solutions

Information Security: Principles and Practice Second Edition. Mark Stamp

Securing a Wireless LAN

Message Authentication Codes and Cryptographic Hash Functions

Network Security and Cryptography. December Sample Exam Marking Scheme

David Wetherall, with some slides from Radia Perlman s security lectures.

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

Configuring a Wireless LAN Connection

Communication Systems for the Mobile Information Society

Understanding Carrier Wireless Systems

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings

Transcription:

English Norwegian University of Science and Technology Department of Telematics EXAM IN TTM4137 WIRELESS SECURITY Contact person: Professor Danilo Gligoroski. (Tel. 95089319). Date of exam: December 04, 2013. Time of exam: 9:00 13:00 (4 hours). Date of grade assignment: January 06, 2014. Credits: 7.5 Permitted aids: Approved calculator. No printed text or handwritten notes permitted. (D). Attachments: 7 pages of questions, The 35 exam questions and problems are divided into three parts, where each part is assigned an evaluation weight percentage of the total. The sequence of questions is probably, but not necessarily in your order of difficulty, so time your work and make sure you find time for all questions. Try to make succinct answers. Your best effort in making a comprehensible handwriting will be much appreciated. Good luck!

TTM4137 Final Exam, Dec. 04, 2013 1 Part I. Wireless Networks Security Facts (50%) This part consists of 25 multiple choice questions. The assessment weight is equally distributed over all the questions in this part. Each question offers four possible answers, but only one is correct. Marking the correct answer results in 2 points, whereas double, wrong or missing mark result in zero. Multiple choice answers Candidate nr USE CAPITAL LETTERS! PLEASE FILL IN AND DELIVER THIS PAGE Nr. Answer Nr. Answer 1 14 2 15 3 16 4 17 5 18 6 19 7 20 8 21 9 22 10 23 11 24 12 25 13

TTM4137 Final Exam, Dec. 04, 2013 2 1. Which one of the following security goals were present for the WEP design: A. To be equivalent to the Kerberos access policy. B. To be equivalent to wired access point security. C. To be equivalent to wide ethernet protocol. D. To be equivalent to wireless entity policy. 2. Which key distribution protocol is specified in WEP? A. Diffie-Hellman key distribution. B. RC4 key distribution. C. RSA key distribution. D. There is no specified key distribution protocol in WEP. 3. What is the major weakness in WEP, exploited by the PTW attack used in the lab? A. RC4 is broken even with 104 bit keys B. The initialization vector is too short C. No protection against message replay D. The integrity check value is too short 4. WPA and WPA2 share the following security component: A. CCMP B. TKIP C. AES D. RC4 5. How many message integrity failures have to be logged in order the Temporal Key Integrity Protocol to start the Denial Of Service mechanism: A. Two failures within 60 seconds B. Two failures within 30 seconds C. Two failures within 10 seconds D. Two failures within 1 second 6. In RSN, the encryption and message authentication are realized via A. AES-GCM B. AES-CBC C. AES-HMAC D. AES-CCMP 7. How big is the message integrity code in RSN A. 32 bits B. 48 bits C. 64 bits D. 128 bits

TTM4137 Final Exam, Dec. 04, 2013 3 8. What is Extensible Authentication Protocol (EAP)? A. EAP is a set of encapsulation messages for upper-layer authentication methods B. EAP is a set of encapsulation messages for physical layer authentication methods C. EAP is a set of encapsulation messages for PKI authentication methods D. EAP is a set of encapsulation messages for RADIUS server authentication methods 9. In GSM, what is the role of the Visitor Location Register: A. When mobile equipment register to the network, to retrieve the information for that equipment from HLR. B. To protect the anonymity of the owner of the mobile equipment. C. To obtain a session key from HLR. D. To communicate the user s Authentication Center (AuC). 10. Which security mechanism is NOT present in GSM: A. Authentication B. Confidentiality C. Anonymity D. Authorization 11. In GSM, what is the role of A8 algorithm: A. For production of random numbers B. For encryption key generation C. For user authentication D. For Data encryption 12. The function f6( ) in the MAPsec protocol of UMTS is: A. AES in counter mode B. AES in CBC mode C. KASUMI in counter mode D. KASUMI in CBC mode 13. How many modes of protection offers MAPsec? A. 1 B. 2 C. 3 D. 4 14. What is the crucial protocol in IP Multimedia Subsystem A. Internet Key Exchange (IKE) B. MAPsec C. Session Initiation Protocol (SIP) D. IPsec

TTM4137 Final Exam, Dec. 04, 2013 4 15. A simple description of MILENAGE functions can be done as: A. f i,k (x) = E K ( E K (x xor c i ) ); where i = 1,2,3,4,5, and c i are distinct constants B. f i,k (x) = E K ( E K (x) xor c i ); where i = 1,2,3,4,5, and c i are distinct constants C. f i,k (x) = E K ( E K (c i ) xor x); where i = 1,2,3,4,5, and c i are distinct constants D. f i,k (x) = E K ( E K (x) ) xor c i ; where i = 1,2,3,4,5, and c i are distinct constants 16. Which two ciphers are used in UEA1 and UEA2 A. AES and KASUMI B. AES and RC4 C. AES and SNOW 3G D. KASUMI and SNOW 3G 17. In UMTS, the function f9( ) is used for: A. Integrity key generation B. Integrity protection C. Encryption key generation D. Encryption 18. Where is encryption located in the UMTS stack of protocols? A. In Physical Layer and Media Access Control Layer B. In Media Access Control Layer and Radio Link Control Layer C. In Radio Link Control Layer and Radio Resource Control Protocol D. In Radio Resource Control Protocol and Higher Layers 19. In UMTS, the security mechanisms employed between the Mobile Station and the Radio Network Controller are responsible for: A. Sequence Number Management B. Encryption and Integrity Protection C. User Authentication D. Network Authentication 20. In LTE, the Home Subscriber Server has the following information: A. policy control and decision-making rules, B. IP address allocation for the UE, C. buffer of downlink data while the MME paging, D. information about the PDNs. 21. In LTE, E-UTRAN is the part of the whole system infrastructure responsible for the: A. radio access network B. circuit switch core network C. packet switch core network D. evolved packet core network

TTM4137 Final Exam, Dec. 04, 2013 5 22. How many security levels has LTE? A. 5 B. 4 C. 3 D. 2 23. The following component IS NOT a part of the RFID technology A. Transceiver Tag Reader B. Transponder RFID tag C. Antenna D. Infra Red Analog/Digital Converter 24. The EPCGen2 tag is A. A passive tag that allows just low-speed reading and sortation B. An Active tag that allows high-speed reading and sortation C. A passive tag that allows high-speed reading and sortation D. An Active tag that allows just low-speed reading and sortation 25. In RFID, the usual budget for implementation of the cryptographic primitives is: A. 100 200 gates B. 200 500 gates C. 500 1000 gates D. 200 2000 gates

TTM4137 Final Exam, Dec. 04, 2013 6 Part II. Cryptographic Mechanisms (35%) Candidate nr PLEASE FILL IN AND DELIVER THIS PAGE 26. Which cipher is used in WEP? (3%) 27. How big can be the key in WEP? (4%) 28. What is the integrity check algorithm used in TKIP? (3%) 29. What is the input data for the integrity check algorithm used in TKIP? (6%) 30. Which cipher is used in RSN? (3%) 31. What is achieved by AES-CCMP? (6%) 32. The key derivation function used in LTE is HMAC. What is the definition of HMAC? (7%) 33. Which hash function is used in the key derivation function of LTE? (3%)

TTM4137 Final Exam, Dec. 04, 2013 7 Part III. Protocols (15%) Candidate nr PLEASE FILL IN AND DELIVER THIS PAGE 34. Name and characterize the main categories of protocol attacks, and rank them according to their capabilities. (5%) 35. Below is a figure of the GSM Authentication protocol where some crucial variables are missing in the blank boxes (one variable per box). Fill in the blank boxes with the correct variables in order the GSM Authentication protocol to be fully defined. (10%)

TTM4137 Final Exam, Dec. 04, 2013 8 TTM4137 Exam Dec. 04, 2013 Solution Outline Danilo Gligoroski Part I. Wireless Networks Security Facts 1b, 2d, 3c, 4b, 5a, 6d, 7c, 8a, 9a, 10d, 11b, 12a, 13c, 14c, 15b, 16d, 17b, 18b, 19b, 20d, 21a, 22a, 23d, 24c, 25d Part II. Cryptographic Mechanisms (35%) 26. RC4, 27. 40 bits or 104 bits, 28. Michael 29. MIC Key, Transmitter address, Receiver address 30. AES 31. Data encryption with AES in Counter mode and Message Authentication with AES CBC-MAC Protocol. 32. HMAC(K,m) = H( (K opad) H((K ipad) m) ) 33. SHA-256 Part III. Protocols (15%) 34. The attacker categories and the granularity of these may vary. For instance, in increasing capability order: Passive (readonly), Active (Modify message, Initiator, Responder, Man-in-themiddle with several sessions,...), Insider games, Insider collusions. 35.