Chapter 3 Ex

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Fachbereich 2 IT-Security

Prof. Dr. Martin Kappes (I/II)

Exercises Chapter “Authentication”

Exercise 1:

Define the terms “Authenticity” and “Authentication” and explain possible factors for au-
thentication. Also, briefly describe what Two-Factor-Authentication is.

Exercise 2:

Name and explain on which points the security of password-based authentication schemes
depends.

Exercise 3:

Discuss how secure passwords should be chosen.

Exercise 4:

Calculate the number of digits a passwords using the symbols a-z for each of thei digits
would need to have such that the size of the password domain is equal to that of a binary
key with 128 bits.

Exercise 5:

Describe the sequence in a password-based challenge-response authentication and compare


its security with sending the password directly either encrypted or unencrypted.

Exercise 6:

Describe the terms “Token”, “Smart Card” and “Biometry” and explain their use for authen-
tication.

Exercise 7:

1
Describe how public key or symmetric cryptography can be used for authentication.

Exercise 8:

Describe what a digital signature is and how it operates. Also describe how hash functions
are used in digital signatures.

Exercise 9:

Explain in detail format, composition and use of certificates. Also describe “Certificate Au-
thorities”, “Root-CA” and “Certificate Revocation”.

Exercise 10:

Discuss advantages and disadvantages of using cerfiticates and CAs.

You might also like