Premium Essay

Cryptograpy Exam

In:

Submitted By joanephraim
Words 649
Pages 3
1. What are some threats associated with a direct digital signature scheme?
a. The scheme validation is dependent on the security of the sender’s private key, which the sender can later claim lost or stolen and that the signature was forged when trying to deny sending a particular message.
b. If a private key is stolen from Bob at time t, the thief can send a message signed with Bob’s signature with a time stamp equal to or less than t.
c. The need for trust between 2 participants is a potential threat since there is no independent verification process.
2. How can you get physical possession of the password hashes from a MS Server 2008 running Active Directory?
a. To obtain hashes from a MS Server 2008, the system has to be compromised; domain hashes are stored in Active Directory on domain controllers while local account hashes are stored in the local SAM database. For member servers and workstations, a domain account’s password hashes can only be stored on systems where the user has performed an interactive logon. When an interactive logon occurs, the domain account's password hash will be stored on disk in the form of a cached-credentials hash.
b. I also need to have administrative rights on the compromised system, the tools required to retrieve domain password hashes, all require admin rights on a running systems. Some tools need to be able to elevate local SYSTEM privileges in order to access protected Registry files, while others work by injecting code into a running process via “SeDebugPrivilege”, which by default is granted only to administrators (Pilkington, 2012).
3. Explain the Diffie-Hellman key exchange like you were talking to a non-technical person.
a. Diffie-Hellman key exchange is one method of digital encryption, what is encryption you may ask: it is the process of encoding information in such a way that only authorized people can

Similar Documents

Premium Essay

Career Preparation

...BLAW 2210 Term Paper Career Preparation My top two career choices are corporate financial analysis in investment banking and actuary. I will be discussing the legal environment of my career choices, taxing authorities, entity structure, graduate school in order to obtain certain license, self-assessment of my chosen careers. First, I will discuss how I can work as a corporate financial analysis in investment banking. After that, I will talk about what I need prepare to be an actuary. 1.corporate financial planning and analysis The responsibility of a corporate financial planing and analysis is to support management planning and decision making by identifying, maintaining, and evaluating information,as well as recommending actions. * Legal environment * Entity structure Investment banking is concerned with the primary function of assisting the capital market in its function of capital market intermediation, i.e. the movement of financial resources from those who have them means investors, to those who need to make use of them means issuer for generating profit. Therefore, it can be inferred that investment banks are those institutions that are the counterparts of banks in the capital market in the function of intermediation in resources allocation. Investment banks carried on carious activities it helps companies and governments and their agencies to raise money by issuing and selling securities in the primary market. They assist public and private corporations...

Words: 3595 - Pages: 15

Free Essay

Student

...University 01/2010 – Present Director Assistant, Canadian Chamber of Commerce in Shanghai 06/2009 – 08/2009 • Designed 2010 Expo Guide for Canadians in Shanghai. • Coordinated events on Canada’s Day and assisted Administrative Director with related projects • Located and entered data into several databases; made phone calls, and ensured timely mail processing. • Assisted administrative team members with clerical function. Dining Service Associate, University of Minnesota – Twin Cities 09/2009 – 12/2009 • Maintained inventory of standard dining service supplies and assists manager coordinate attendants. Member, Actuarial Club in University of Minnesota – Twin Cities 01/2009 – 12/2009 • Arranged the preparation of Casualty Actuarial Society (CAS) exam Volunteer, Students Today Leaders Forever 03/2009 – 12/2009 • Assisted the donation of food to Minnesotans at risk of hunger. Volunteer, in school for the Mute and the Deaf in Zhoushan, Zhejiang Province 2006 – 2009 • Taught disabled students Mandarin. Policy-analyst, Model United Nation in Shanghai K.J. Senior High School 2006 – 2008 • Analyzed UN policies for Model UN conferences HONORS/ AWARDS Honor Program, Awarded by Associate Dean of University of Minnesota – Twin Cities Global Excellent Scholarship, Awarded by University of Minnesota – Twin Cities Dean's List, Awarded by University of Minnesota – Twin Cities st th 1 prize, World 20 Odyssey of Mind Competition in China Area 09/2008 – 12/2009 09/2008 – 12/2009 Fall 2008, Fall 2009...

Words: 354 - Pages: 2

Premium Essay

Cryptography

...Cryptograpy Exam 1. What are some threats associated with a direct digital signature scheme? a. The scheme validation is dependent on the security of the sender’s private key, which the sender can later claim lost or stolen and that the signature was forged when trying to deny sending a particular message. b. If a private key is stolen from Bob at time t, the thief can send a message signed with Bob’s signature with a time stamp equal to or less than t. c. The need for trust between 2 participants is a potential threat since there is no independent verification process. 2. How can you get physical possession of the password hashes from a MS Server 2008 running Active Directory? a. To obtain hashes from a MS Server 2008, the system has to be compromised; domain hashes are stored in Active Directory on domain controllers while local account hashes are stored in the local SAM database. For member servers and workstations, a domain account’s password hashes can only be stored on systems where the user has performed an interactive logon. When an interactive logon occurs, the domain account's password hash will be stored on disk in the form of a cached-credentials hash. b. I also need to have administrative rights on the compromised system, the tools required to retrieve domain password hashes, all require admin rights on a running systems. Some tools need to be able to elevate local SYSTEM privileges in order to access protected Registry files, while others work by injecting...

Words: 338 - Pages: 2