Download presentation

Presentation is loading. Please wait.

Published byOrion Griscom Modified over 2 years ago

1
Final Exam Review Exam time is Aug. 2 nd 2:00pm – 3:50pm in the same classroom. All semester’s content will be tested, but more on content after midterm exam #2. What actually covered in the final exam: –All questions in the 4 homework assignments. –Questions/examples in previous two midterm review slides –Questions/examples in this review slides.

2
You need to compute out the final numerical results in your answer. Do not simply write down the formula as your answer. –You can bring a calculator (no computer, iPhone, etc) –The numbers in exam are easy to comput

3
Question Types –Knowledge questions –True or false statement If false, explain why and give the correct statement –Protocols –Calculations

4
Knowledge Question Examples What are the two classes of cryptography? Which one is similar to shuffling poker card: Substitution cipher or transposition cipher? DES has fixed-size key while AES has options to choose several different sizes of key. Why currently people use 3DES instead of DES? What are the pros and cons for symmetric key crypto? Public key crypto? –Two points: computation cost; key predistribution challenge What is the major difference between HTTP 1.0 and 1.1? Why 1.1 makes such change?

5
Knowledge Question Examples What are the two major hash functions in use? –SHA-1 and MD5 Using the notation in ch31.ppt, what are the meaning of: –H(m), K A - (H(m)), K CA - (K A + ), K AB (m) Full name of SMTP, FTP, RR, TLD? What are the four types of DNS resource record? Service port for DNS, SMTP, HTTP, SSH, Telnet. SMTP basic commands for email compositing

6
Calculation Problem Examples Compute ciphertext using Cesar cipher Compute ciphertext given transposition cipher key (ch30.ppt, P16-18) If Alice wants to send a message m to Bob confidentially and wants Bob be sure that it is from Alice, what message format should be? Assume Alice and Bob knows each other’s public key beforehand. What if only integrity is required? DNS setup and RRs for a new company (HW4)

7
Excluding Contents Packet fragmentation SNR and dB concepts and computation Shannon and Nyquist theories Stop-Wait ARQ and go-back-N ARQ CRC computation Checksum computation

Similar presentations

OK

14-1 Last time Internet Application Security and Privacy Basics of cryptography Symmetric-key encryption.

14-1 Last time Internet Application Security and Privacy Basics of cryptography Symmetric-key encryption.

© 2018 SlidePlayer.com Inc.

All rights reserved.

Ads by Google

Ppt on law against child marriage in nigeria Ppt on instrument landing system localizer Ppt on summary writing exercises Ppt on how google search engine works Ppt on acute coronary syndrome nursing Ppt on nitrogen cycle and nitrogen fixation process Ppt on best practices in hr Ppt on abo blood grouping Ppt on soil microbial biomass carbon Convert pdf to ppt online adobe