Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
cs-465:exam-2 [2017/04/12 13:52]
fred
cs-465:exam-2 [2017/12/04 22:38] (current)
seamons
Line 15: Line 15:
 * know record format * know record format
 * know what data is exchanged at what phases and it’s composition. * know what data is exchanged at what phases and it’s composition.
-* <​del>​session resumption and how it works, and why we do it</​del>​ 
 * be able to explain the parts of a cipher name e.g. TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 * be able to explain the parts of a cipher name e.g. TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
  
Line 39: Line 38:
 * Lamport'​s Hash - how does it work? how to attack it? * Lamport'​s Hash - how does it work? how to attack it?
 * Salts - what and why? * Salts - what and why?
- 
-Attacks against, and countermeasures for programs that hold passwords 
- 
-<​del>​Command Injection Vulnerabilities,​ prevention and mitigation techniques</​del>​ 
- 
-<​del>​Usability as a security problem - be prepared to give examples and explain</​del>​ 
  
 Ken Thompson compiler hack - how it works Ken Thompson compiler hack - how it works
Line 52: Line 45:
 ANYTHING in any of your projects, or homework assignments. ANYTHING in any of your projects, or homework assignments.
  
 +Review Exam 1 problems ​
 +* MAC/HMAC, hashes and how they are implemented,​ and how they are not the same
 +* digital signatures
  
 Remaining topics are for final exam Remaining topics are for final exam
Line 59: Line 55:
 * How to defend against it? * How to defend against it?
  
-Review Exam 1 problems ​ 
-* MAC/HMAC, hashes and how they are implemented,​ and how they are not the same 
cs-465/exam-2.txt · Last modified: 2017/12/04 22:38 by seamons
Back to top
CC Attribution-Share Alike 4.0 International
chimeric.de = chi`s home Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0