This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
cs-465:exam-2 [2016/11/29 13:33] seamons |
cs-465:exam-2 [2017/12/04 15:38] (current) seamons |
||
---|---|---|---|
Line 1: | Line 1: | ||
'''Exam 2''' | '''Exam 2''' | ||
- | Date: Tues Dec 6th | + | |
Location: In Class | Location: In Class | ||
Line 15: | Line 15: | ||
* know record format | * know record format | ||
* know what data is exchanged at what phases and it’s composition. | * know what data is exchanged at what phases and it’s composition. | ||
- | * session resumption and how it works, and why we do it | ||
* be able to explain the parts of a cipher name e.g. TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 | * be able to explain the parts of a cipher name e.g. TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 | ||
Line 39: | Line 38: | ||
* Lamport's Hash - how does it work? how to attack it? | * Lamport's Hash - how does it work? how to attack it? | ||
* Salts - what and why? | * Salts - what and why? | ||
- | |||
- | Attacks against, and countermeasures for programs that hold passwords | ||
- | |||
- | Command Injection Vulnerabilities, prevention and mitigation techniques | ||
- | |||
- | Usability as a security problem - be prepared to give examples and explain | ||
Ken Thompson compiler hack - how it works | Ken Thompson compiler hack - how it works | ||
Line 52: | Line 45: | ||
ANYTHING in any of your projects, or homework assignments. | ANYTHING in any of your projects, or homework assignments. | ||
+ | Review Exam 1 problems | ||
+ | * MAC/HMAC, hashes and how they are implemented, and how they are not the same | ||
+ | * digital signatures | ||
Remaining topics are for final exam | Remaining topics are for final exam | ||
Line 59: | Line 55: | ||
* How to defend against it? | * How to defend against it? | ||
- | Review Exam 1 problems | ||
- | * MAC/HMAC, hashes and how they are implemented, and how they are not the same |