Show your work (except for the True/false questions) using proper terms and notations.
(a) On a Microsoft Windows-based laptop computer the SECURITY registry file maintains a history list of the host computerâs wireless connections.
(b) The electric and magnetic fields associated with an electromagnetic wave are typically perpendicular to each other when the wave is propagating in open space.
(c) In a noise-free communication channel if the number of discrete signal (or voltage) levels is doubled from 4 levels to 8 levels, then the channel capacity (i.e., data rate) is expected to be doubled.
(d) IEEE 802.11 Security Standard WEP (Wired Equivalent Privacy) uses CRC checksum for its data integrity protection.
(e) In IEEE 802.11 Security Standard WEP (Wired Equivalent Privacy), both the Initialization Vector (IV) and Integrity Check Value (ICV) are sent in clear text when included in a frame/packet during transmission.
(f) Wireless stations (clients) may be communicating directly with each other and without going through the access point (AP) when the network is operating in the Infrastructure Mode.
(g) The services and protocols specified in the IEEE 802 family map to the bottom three layers of the OSI (Open Systems Interconnection) 7-layer model.
(h) The RC4 cipher used in WEP (Wired Equivalent Privacy) uses a CRC algorithm in generating pseudo-random numbers.
(i) Suppose an electromagnetic wave has a frequency of f cycles/second, a period T seconds/cycle, and a wave length W meters/cycle. These quantities are related by the equation c = W/T when the waves are transmitted in a vacuum, where c = the speed of light ? 3?108 meters/second.
(j) Within the frequency bands of the radio spectrum defined by the International Telecommunication Union (ITU), the UHF (ultrahigh frequency band) is of higher frequency than that of the SHF (superhigh frequency band).
(k) Encoding and decoding wireless signals is a function of the PHY (physical) layer of the 802.11 protocol.
(l) The OSI security architectureâs recommendation X.800 is prepared by the ITU-T sector of the International Telecommunication Union (ITU). (m)The three interframe space (IFS) values used in frame transmissions of an 802.11 network are related by the following: DIFS > PIFS > SIFS.
(n) Each 802.11 MAC frame must include at least two MAC addresses (for sender and receiver, respectively).
(o) Suppose the first, lower-address byte is 0x40 for an 802.11 MAC frameâs FC (frame control) field. This MAC frameâs subtype is âAssociation Request.â
(p) A typical client authentication process of 802.11 networks requires the client first be authenticated with an AP (access point) before being associated.
(q) The FMS attack against a WEP-protected wireless network exploited the flaw due to RC4âs weak keys.
(a) What do each of the letters âCâ, âIâ, and âAâ stand for in the âCIA Triadâ?
(b) Which of the above three security objectives includes ensuring information ânon-repudiationâ and âauthenticityâ?
(a) Calculate the channel's signal-to-noise ratio in decibels, SNRdB.
(b) Calculate the (maximum) channel capacity according to the Shannon Capacity Formula, assuming the channelâs signal-to-noise ratio SNR = 400.
(a) Suppose an attacker knew the plaintext is of 2 bytes (i.e., 16 bits, bits numbered 0 to 15 from left to right), and the attacker wants to change/flip bits 0, 3, and 15 (according to the above bit numbering order) of the plaintext but without knowing the key values. Assuming the attacker could capture the transmission signal, stop it from being delivered to the intended receiver, alter the captured ciphertext and resend it without disrupting the communication. Describe precisely (with all details):
(i) how and what the attacker should do to modify the captured ciphertext (which consists of a total of 6 bytes);
(ii) what the attacker sends to the receiver;
(iii) how the receiver recovers the altered plaintext and verifies the CRC checksum, without detecting the data had been altered (i.e., the attacker succeeded)
(b) Suppose the attacker knew the plaintext, which is a 2-byte text âWZâ, and captured the ciphertext when the sender sent, in hexadecimal values, as 0x5659 and 0xC8EE1BEB. Describe precisely (with all details) how and what the attacker could do to determine the key values of K1,
K2 used in the stream cipher, including the recovered key values. (Note: Do not use any bruteforce methods.)
Suppose you are given what appears to be the beginning 217 bytes of a pcap file (but incomplete) shown below in a hex dump:
Answer each of the below questions with answers only, no explanations needed:
(a) Determine the type/format of this pcap file (i.e., choose one of the following: the original pcap format originated from the libpcap library; the pcap next generation pcapng format; or N/A if the information not applicable or not available)
(b) Determine the link layer type of packets in the file (both the code in decimal value and its name; or N/A if the information is not applicable/available)
(c) Determine the first packet's time stamp in the form of yyyy-mm-dd hh:mm:ss.xxxxxx (where y:year, m:month, d:day, h:hour, m:miute, s:second, x's: micro- or nano-seconds), or N/A if the information is not applicable/available.
(d) Determine the first packet's length (in bytes, in decimal value) excluding the packet header, or answer N/A if the information is not applicable/available.
(e) Determine the type (both name and code in decimal value), subtype (code, in decimal value), and any non-zero flag(s) in the Frame Control field of the fileâs first MAC frame, or answer N/A if the information is not applicable/available. Hint: the first MAC frame starts at offset 0x7C.
(f) Determine the first MAC frameâs Duration (in decimal value)
(g) Determine the first MAC frameâs fragment number and sequence number (in decimal value)
(h) Determine the first MAC frameâs all embedded MAC addresses and their designation (DA, SA, etc.)