CMSC-443: Homework (spring 1999)
Read and follow the Alan Sherman's
"How to solve and write up homework."
HW 1 (Due February 8) Read Stallings, Chapter 1. Design a
new hand cipher. Your cipher must be useful in practice to people
who must compute only with paper and pencil. Make your cipher as secure
as possible subject to this constraint. Present and analyze your
HW 2 (Due February 15)
Read Stallings, Chapter 2. Do Problems
2.3, 2.4, and 2.6.
HW 3 (Due February 22)
Read Stallings, Chapters 3,6,7. Do Problems
3.12 (make and justify as many interesting observations as you can),
6.4, 7.15 (use CRT). Be sure to show all
work in detail.
HW 4 (Due March 1)
Read Stallings, Chapters 4,5.
Do Problems 4.3, 5.10, 7.7.
HW 5 (Due March 8)
Read Denning, Section 1.4; do Problems 1.5 and 1.9
on Denning, Page 54 (see handout).
Read Stallings, Section 6.5; do Problem 6.16.
Exam I will take place Wednesday, March 17.
It will cover HWs 1-5.
Project proposal is
due March 15.
HW 6 (Due March 29)
Read Stallings Chapters 8-9. Do Problems 5.3, 8.3, 8.6.
HW 7 (Due April 5)
Read Stallings Chapter 10.
(1-2) Do Problems 10.8 and 10.11.
(3) Design and analyze a pseudorandom number generator (PRNG)
based on a cryptographic hash function (e.g. SHA-160). Consider two
different designs: (a) one for keystream ciphers, and (b) another which
adds entropy from "random bits" harvested in software
from system measurements. Comment on the different
requirements and applications for these two different
types of PRNGs. Estimate the rate (bits/sec) that each of your
designs achieves when run on a 450 MHz processor.
HW 8 (Due April 12)
Read Stallings Chapter 11 and the
Rivest and Lampson on
(1-2) Do Problems 11.3 and 11.4
(3) Redesign the Kerberos
Protocol in Table 11.1 on page 330 using public-key
cryptography. Clearly state your new protocol,
explain your design, and comment on the protocol's security.
What advantages, if any, does your protocol have
over the one in Table 11.1?
HW 9 (Due April 19)
Read Stallings Chapters 12-13.
Also, read the paper "Problem arteas for IP secruity protocols"
by Steven M. Bellovin (1996).
Do the following problems:
(1) Create a PGP public-key/private-key pair for yourself.
Send a signed PGP email to the TA, together with your
PGP public key. Write a 1-2 page essay explaining how
you accomplished these feats and what difficulties
you encountered. How easy is PGP to use?
(2) 13.1 (3) 13.4.
Exam II will take place Wednesday, April 28.
It will cover HWs 6-9.
A project progress report
is due Monday, April 26. Your progress report
should explain what you have done and what remains to be done.
It should also include a project title, clear statement
of the main question you will be answering, bibliography,
and outline of your report.