密码编码学与网络安全第五版答案.docx

上传人:b****0 文档编号:337492 上传时间:2022-10-09 格式:DOCX 页数:86 大小:136.18KB
下载 相关 举报
密码编码学与网络安全第五版答案.docx_第1页
第1页 / 共86页
密码编码学与网络安全第五版答案.docx_第2页
第2页 / 共86页
密码编码学与网络安全第五版答案.docx_第3页
第3页 / 共86页
密码编码学与网络安全第五版答案.docx_第4页
第4页 / 共86页
密码编码学与网络安全第五版答案.docx_第5页
第5页 / 共86页
点击查看更多>>
下载资源
资源描述

密码编码学与网络安全第五版答案.docx

《密码编码学与网络安全第五版答案.docx》由会员分享,可在线阅读,更多相关《密码编码学与网络安全第五版答案.docx(86页珍藏版)》请在冰豆网上搜索。

密码编码学与网络安全第五版答案.docx

密码编码学与网络安全第五版答案

Chapter1:

Introduction5

Chapter2:

ClassicalEncryptionTechniques7

Chapter3:

BlockCiphersandtheDateEncryptionStandard13

Chapter4:

FiniteFields21

Chapter5:

AdvancedEncryptionStandard28

Chapter6:

MoreonSymmetricCiphers33

Chapter7:

ConfidentialityUsingSymmetricEncryption38

Chapter8:

IntroductiontoNumberTheory42

Chapter9:

Public-KeyCryptographyandRSA46

Chapter10:

KeyManagement;OtherPublic-KeyCryptosystems55

Chapter11:

MessageAuthenticationandHashFunctions59

Chapter12:

HashandMACAlgorithms62

Chapter13:

DigitalSignaturesandAuthenticationProtocols66

Chapter14:

AuthenticationApplications71

Chapter15:

ElectronicMailSecurity73

Chapter16:

IPSecurity76

Chapter17:

WebSecurity80

Chapter18:

Intruders83

Chapter19:

MaliciousSoftware87

Chapter20:

Firewalls89

AnswerstoQuestions

1.1TheOSISecurityArchitectureisaframeworkthatprovidesasystematicwayofdefiningtherequirementsforsecurityandcharacterizingtheapproachestosatisfyingthoserequirements.Thedocumentdefinessecurityattacks,mechanisms,andservices,andtherelationshipsamongthesecategories.

1.2Passiveattackshavetodowitheavesdroppingon,ormonitoring,transmissions.Electronicmail,filetransfers,andclient/serverexchangesareexamplesoftransmissionsthatcanbemonitored.Activeattacksincludethemodificationoftransmitteddataandattemptstogainunauthorizedaccesstocomputersystems.

1.3Passiveattacks:

releaseofmessagecontentsandtrafficanalysis.Activeattacks:

masquerade,replay,modificationofmessages,anddenialofservice.

1.4Authentication:

Theassurancethatthecommunicatingentityistheonethatitclaimstobe.

Accesscontrol:

Thepreventionofunauthorizeduseofaresource(i.e.,thisservicecontrolswhocanhaveaccesstoaresource,underwhatconditionsaccesscanoccur,andwhatthoseaccessingtheresourceareallowedtodo).

Dataconfidentiality:

Theprotectionofdatafromunauthorizeddisclosure.

Dataintegrity:

Theassurancethatdatareceivedareexactlyassentbyanauthorizedentity(i.e.,containnomodification,insertion,deletion,orreplay).

Nonrepudiation:

Providesprotectionagainstdenialbyoneoftheentitiesinvolvedinacommunicationofhavingparticipatedinallorpartofthecommunication.

Availabilityservice:

Thepropertyofasystemorasystemresourcebeingaccessibleandusableupondemandbyanauthorizedsystementity,accordingtoperformancespecificationsforthesystem(i.e.,asystemisavailableifitprovidesservicesaccordingtothesystemdesignwheneverusersrequestthem).

1.5SeeTable1.3.

AnswerstoProblems

1.1

Releaseofmessagecontents

Trafficanalysis

Masquerade

Replay

Modificationofmessages

Denialofservice

Peerentityauthentication

Y

Dataoriginauthentication

Y

Accesscontrol

Y

Confidentiality

Y

Trafficflowconfidentiality

Y

Dataintegrity

Y

Y

Non-repudiation

Y

Availability

Y

1.2

Releaseofmessagecontents

Trafficanalysis

Masquerade

Replay

Modificationofmessages

Denialofservice

Encipherment

Y

Digitalsignature

Y

Y

Y

Accesscontrol

Y

Y

Y

Y

Y

Dataintegrity

Y

Y

Authenticationexchange

Y

Y

Y

Y

Trafficpadding

Y

Routingcontrol

Y

Y

Y

Notarization

Y

Y

Y

Chapter2

ClassicalEncryptionTechniquesr

AnswerstoQuestions

2.1Plaintext,encryptionalgorithm,secretkey,ciphertext,decryptionalgorithm.

2.2Permutationandsubstitution.

2.3Onekeyforsymmetricciphers,twokeysforasymmetricciphers.

2.4Astreamcipherisonethatencryptsadigitaldatastreamonebitoronebyteatatime.Ablockcipherisoneinwhichablockofplaintextistreatedasawholeandusedtoproduceaciphertextblockofequallength.

2.5Cryptanalysisandbruteforce.

2.6Ciphertextonly.Onepossibleattackunderthesecircumstancesisthebrute-forceapproachoftryingallpossiblekeys.Ifthekeyspaceisverylarge,thisbecomesimpractical.Thus,theopponentmustrelyonananalysisoftheciphertextitself,generallyapplyingvariousstatisticalteststoit.Knownplaintext.Theanalystmaybeabletocaptureoneormoreplaintextmessagesaswellastheirencryptions.Withthisknowledge,theanalystmaybeabletodeducethekeyonthebasisofthewayinwhichtheknownplaintextistransformed.Chosenplaintext.Iftheanalystisabletochoosethemessagestoencrypt,theanalystmaydeliberatelypickpatternsthatcanbeexpectedtorevealthestructureofthekey.

2.7Anencryptionschemeisunconditionallysecureiftheciphertextgeneratedbytheschemedoesnotcontainenoughinformationtodetermineuniquelythecorrespondingplaintext,nomatterhowmuchciphertextisavailable.An

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 党团工作 > 其它

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1