密码编码学与网络安全英文答案优质资料

上传人:M****1 文档编号:564790672 上传时间:2023-01-07 格式:DOC 页数:112 大小:1.09MB
返回 下载 相关 举报
密码编码学与网络安全英文答案优质资料_第1页
第1页 / 共112页
密码编码学与网络安全英文答案优质资料_第2页
第2页 / 共112页
密码编码学与网络安全英文答案优质资料_第3页
第3页 / 共112页
密码编码学与网络安全英文答案优质资料_第4页
第4页 / 共112页
密码编码学与网络安全英文答案优质资料_第5页
第5页 / 共112页
点击查看更多>>
资源描述

《密码编码学与网络安全英文答案优质资料》由会员分享,可在线阅读,更多相关《密码编码学与网络安全英文答案优质资料(112页珍藏版)》请在金锄头文库上搜索。

1、密码编码学与网络安全英文答案优质资料(可以直接使用,可编辑 优质资料,欢迎下载)Chapter 1:Introduction5Chapter 2:Classical Encryption Techniques7Chapter 3:Block Ciphers and the Date Encryption Standard13Chapter 4:Finite Fields21Chapter 5:Advanced Encryption Standard28Chapter 6:More on Symmetric Ciphers33Chapter 7:Confidentiality Using Sym

2、metric Encryption38Chapter 8:Introduction to Number Theory42Chapter 9:Public-Key Cryptography and RSA46Chapter 10:Key Management; Other Public-Key Cryptosystems55Chapter 11:Message Authentication and Hash Functions59Chapter 12:Hash and MAC Algorithms62Chapter 13:Digital Signatures and Authentication

3、 Protocols66Chapter 14:Authentication Applications71Chapter 15:Electronic Mail Security73Chapter 16:IP Security76Chapter 17:Web Security80Chapter 18:Intruders83Chapter 19:Malicious Software87Chapter 20:Firewalls89Answers to Questions1.1The OSI Security Architecture is a framework that provides a sys

4、tematic way of defining the requirements for security and characterizing the approaches to satisfying those requirements. The document defines security attacks, mechanisms, and services, and the relationships among these categories.1.2Passive attacks have to do with eavesdropping on, or monitoring,

5、transmissions. Electronic mail, file transfers, and client/server exchanges are examples of transmissions that can be monitored. Active attacks include the modification of transmitted data and attempts to gain unauthorized access to computer systems.1.3Passive attacks: release of message contents an

6、d traffic analysis. Active attacks: masquerade, replay, modification of messages, and denial of service.1.4Authentication: The assurance that the communicating entity is the one that it claims to be. Access control: The prevention of unauthorized use of a resource (i.e., this service controls who ca

7、n have access to a resource, under what conditions access can occur, and what those accessing the resource are allowed to do). Data confidentiality: The protection of data from unauthorized disclosure. Data integrity: The assurance that data received are exactly as sent by an authorized entity (i.e.

8、, contain no modification, insertion, deletion, or replay). Nonrepudiation: Provides protection against denial by one of the entities involved in a communication of having participated in all or part of the communication. Availability service: The property of a system or a system resource being acce

9、ssible and usable upon demand by an authorized system entity, according to performance specifications for the system (i.e., a system is available if it provides services according to the system design whenever users request them). 1.5See Table 1.3.Answers toProblems1.1Release of message contentsTraf

10、fic analysisMasqueradeReplayModification of messagesDenial of servicePeer entity authenticationYData origin authenticationYAccess controlYConfidentialityYTraffic flow confidentialityYData integrityYYNon-repudiationYAvailabilityY1.2Release of message contentsTraffic analysisMasqueradeReplayModificati

11、on of messagesDenial of serviceEnciphermentYDigital signatureYYYAccess controlYYYYYData integrityYYAuthentication exchangeYYYYTraffic paddingYRouting controlYYYNotarizationYYYChapter 2Classical Encryption TechniquesrAnswers to Questions2.1Plaintext, encryption algorithm, secret key, ciphertext, decr

12、yption algorithm.2.2Permutation and substitution.2.3One key for symmetric ciphers, two keys for asymmetric ciphers.2.4A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. A block cipher is one in which a block of plaintext is treated as a whole and used to produc

13、e a ciphertext block of equal length.2.5Cryptanalysis and brute force.2.6Ciphertext only. One possible attack under these circumstances is the brute-force approach of trying all possible keys. If the key space is very large, this becomes impractical. Thus, the opponent must rely on an analysis of th

14、e ciphertext itself, generally applying various statistical tests to it. Known plaintext. The analyst may be able to capture one or more plaintext messages as well as their encryptions. With this knowledge, the analyst may be able to deduce the key on the basis of the way in which the known plaintex

15、t is transformed. Chosen plaintext. If the analyst is able to choose the messages to encrypt, the analyst may deliberately pick patterns that can be expected to reveal the structure of the key.2.7An encryption scheme is unconditionally secure if the ciphertext generated by the scheme does not contain enough information to determine uniquely the corresponding pl

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 建筑/环境 > 施工组织

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号