Net Security Notes Essay

5263 words - 22 pages

Network Security past Paper + Tutorial Questions and Answers:
Past Paper
Group 1 Internet Key Exchange (IKE)
Question 1
(a) Shown below is the first message of the Main Mode of IKE Phase 1 using signature authentication:
write down the other five messages in this format.

(b) For the messages in (a) above, describe the contents of each of the IKE payloads in the messages sent by Responder, i.e. the second, fourth and sixth messages.
SA= is the Security Association payload, in message two it contains the responders choice of algorithm.
KE= is the key exchange payload, it contains the responders DH key exchange parameters.
Nr= Nis the nonce payload and contains random ...view middle of the document...

This is more efficient as mutual authentication does not need to be performed in creating IPsec SAs, and the more permanent secretes are only used once.
In Phase 2, an IPsec SA can be created using 3 messages. All secrets used in the
IPsec SA and the IPsec SA itself are temporary. They can be created and terminated efficiently. Changing temporary secrets more often improves the security of the secure communications.
Written Tutorial
Question 1
The IKE protocol consists of two phases, i.e., IKE Phase 1 and IKE Phase 2.
a) Briefly describe the functions of the two phases, respectively;
Phase 1:
- Main purpose of phase 1 is to create a secure channel, by performing mutual authentication
- Negotiates crypto algorithms to be used
- DH values are exchanged which contribute to keying material, which in tern creates sessions keys
- Mutual authentication of end entities
Phase 2:
- Main purpose of phase 2 is to create 2 or more secure channels
- Negotiate crypto algorthms to be used
- Optionally, exchange dh values, which help to create keying material + session keys
- Optionally exchange traffic selectors.
b) Describe the advantages in separating the IKE protocol into two phases.
Advantages are mainly in security and efficiency.
Using Phase 1, mutual authentication is only performed once for the two end entities to create an IKE SA, which can then be used to create as many as IPsec SAs as required. This is more efficient as mutual authentication does not need to be performed in creating IPsec SAs, and the more permanent secretes are only used once.
In Phase 2, an IPsec SA can be created using 3 messages. All secrets used in the
IPsec SA and the IPsec SA itself are temporary. They can be created and terminated efficiently. Changing temporary secrets more often improves the security of the secure communications.
c) By comparing the messages used in IKE v1 Phases 1 and 2 with those used in IKE v2 Initial Exchange and CREATE_CHILD_SA Exchange, comment on their similarities and differences.
Question 2
From the corresponding RFC, list the six messages in IKE Main Mode with signature authentication. Describe the differences between this and IKE Main Mode with pre-shared key authentication. Describe briefly the contents and functions of the IKE payload types. Note that the level of description required for this question should be more or less the same as the lecture’s, not as that in the RFC.
From RFC2409, IKE Main Mode with signature authentication is

Question 3
In IKE Main Mode, all three methods of mutual authentications have been discussed, i.e.,
Describe exactly how mutual authentication is accomplished in each case.
1) Authentication with a pre-shared key in Lecture 4-14
From the lecture notes, the relevant messages in IKE Main Mode using preshared key for authentication:
Removing the irrelevant items as far as mutual authentication is concerned, we have:
Apart from the...

Other Essays Like Net Security Notes

Fsa Assignment 1

3737 words - 15 pages reconciliation of net income and comprehensive income in a separate financial statement. | | |d. The recording of period costs on the balance sheet. | |2. |Revenues are earned when | | |a. a contract is signed by both

Risk Free Interest Rate Essay

1108 words - 5 pages capital structure refers to the desired optimal mix of debt and equity financing that most firms attempt to achieve and maintain. B. COST OF LONG-TERM DEBT Definitions • Net proceeds : Funds received from the sale of a security (e.g. bond) – Incur two types of costs: flotation and discount • Flotation costs : issuing and selling a security – Apply to all public offerings of securities (debt, preferred and common

Financial Terms

741 words - 3 pages investors essentially determining the security pricing. Primary market The primary market is the market where buyers and sellers negotiate and make transactions directly without additional resale brokers. It is the market where the new securities are issued and offered to the public. An example of a transaction in the primary market is a relatively new company offering stocks to the public. Secondary market The secondary market is a financial

Peabody Energy Financial Assessment

4574 words - 19 pages fuels and effectively enhance energy security. Boyce’s eight-point plan improves energy security and lowers cost by his initiatives to turn coal into clean energy and vastly expanding coal consumption in the process. (See Appendix G) Analysing this future plan in terms of net present value seems like a tremendous success for Peabody. Peabody’s clean energy initiative will cause a dramatic increase in coal production due to the United

Hcs 405 Ethics

855 words - 4 pages CFO may worry about job security” (Tyler). It seems that all or most health care organizations are in trouble financially and that all organizations are in a desperate search for a financial management system that will work for them. This paper will discuss generally accepted accounting principles, corporate compliance, ethics, fraud and abuse. Generally Accepted Accounting Principles “The phrase

Computer Network & Information Security

1478 words - 6 pages hacking. Therefore it is even more vital to make security a top priority. 1.) Simmonds, A., Sandilands, P., Ekert, L. (2004, January). "An Ontology for Network Security Attacks". Lecture Notes in Computer Science. Lecture Notes in Computer Science 3285: p. 317–323. ISBN 978-3-540-23659-7. Retrieved from 2.) Luminita, D. (2011). Security Issues in e-learning platforms. World

A Case Analysis On Charles’ Clamps Corporation Structuring Short Term Liabilities: Sequential Method

2817 words - 12 pages )Earnings after TaxesCommon DividendsChanges in Retained Earnings Balance Sheet 12/31/1984CashMarketable Securities Accounts ReceivableInventoriesOther Current AssetsTotal Current Assets Gross Fixed AssetsLess: Accumulated Depreciation Net Fixed AssetsOther AssetsTotal Assets | $10246 7768 204 | | 2274

Nokia: Weak Signal

2749 words - 11 pages closed to retained earnings is also decreased. Panel A and B of Table 2 presented in the notes to Nokia’s IFRS/US GAAP adjustments reflect the decreases to net income and shareholders’ equity when presented under IFRS. Panel A demonstrates the net income effect in each year there is a goodwill amortization expense difference. According to Panel A, Nokia reported $106, $162, $206, and $28 million goodwill amortization expense under IFRS in the years

Financial Terms and Roles Paper

1066 words - 5 pages market is a market whose prices quickly respond to the announcement of new information (Titman, Keown, & Martin, Chapter 1, 2012). The stock market is an example of an efficient market. • Primary market Primary market is a part of the financial market where new security issues are initially bought and sold. In this market, firms receive money raised in the selling of their securities. They issue new securities to raise money that they can

Adms 3530 Exam Review

3994 words - 16 pages Method 2: Cash flow from operations = net profit (after-tax) + depreciation Method 3: Cash flow from operations = (revenues – cash expenses) ×  (1  −  t)  +  (depreciation  or  CCA  ×  t) Notes: You will be given depreciation , or CCA, not both. “Net  Profit”,  assume  its  “after-tax”  Net  Profit Taxable income = revenues – expenses – CCA CCA tax shield (for a single year) = CCA × tax rate Present value of CCA tax shield (for  a  project’s  life


1854 words - 8 pages d. The transaction or other event creating the obligation must have already occurred 2. Current liabilities are: a. Liabilities that are due and payable on the balance sheet date b. Liabilities that may be paid out of any asset pool accumulated by the enterprise as long as payment is due within one year c. Due within one year or one operating cycle, whichever is longer d. Void of notes

Related Papers

Case Study Clarkson

4272 words - 18 pages ; | | | | | | | 2.Total COGS、Gross profit、Operating expenses、Interest exp.、Cash、A/R,net、Inventory、Property,net、Notes payable,trade、A/P and Accrued exp.with fixed percentage with net sales | 3.Interest exp comes from the 'Debt with interest' form(see Form 9) | | | 4.Net income before income taxes isbase on progressive taxation in the material | | 5.'Notes payable,bank' holds the $399 | | | | | 6.'Term loan,current' portion is identical to

Acct 551 Week 2 Homework Essay

1306 words - 6 pages Payable 6,000 Notes Payable 81,000 (b) Prepare adjusting entries at December 31. Interest Expense 1000 Interest Payable 1000 (50,000x8%x3/12) Interest Expense 1500 Discount on Notes Payable 1500 (6000x3/12) (c) Compute the total net liability to be reported on the December 31 balance sheet for: (1) The interest-bearing note. Notes Payable 50,000 Interest Payable 1000 $51,000 (2) The zero-interest-bearing note. Notes

Professional Research Fasb Codification Essay

824 words - 4 pages payments need not be equal. Disclosures: FASB ASC 320-10-50-10 says for any sales of or transfers from securities classified as held-to-maturity, an entity shall disclose all of the following in the notes to the financial statements for each period for which the results of operations are presented: I. The net carrying amount of the sold or transferred security II. The net gain or loss in accumulated other comprehensive income for any

Accounting Essay

2684 words - 11 pages this from net income? It is thought that it transitions GAAP over to an “all-inclusive” concept of net income. *WA 4-2 This question deals with the ethical issues of honesty and integrity in financial reporting, job security for Banks, and the owners’ right to know the financial picture. Banks could prepare financial statements on both bases and explain the differences to the owners. If the owners withdraw cash from the business without