密码编码学与网络安全(第五版)答案

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

ANSWERSTOQUESTIONS1.1TheOSISecurityArchitectureisaframeworkthatprovidesasystematicwayofdefiningtherequirementsforsecurityandcharacterizingtheapproachestosatisfyingthoserequirements.Thedocumentdefinessecurityattacks,mechanisms,andservices,andtherelationshipsamongthesecategories.1.2Passiveattackshavetodowitheavesdroppingon,ormonitoring,transmissions.Electronicmail,filetransfers,andclient/serverexchangesareexamplesoftransmissionsthatcanbemonitored.Activeattacksincludethemodificationoftransmitteddataandattemptstogainunauthorizedaccesstocomputersystems.1.3Passiveattacks:releaseofmessagecontentsandtrafficanalysis.Activeattacks:masquerade,replay,modificationofmessages,anddenialofservice.1.4Authentication:Theassurancethatthecommunicatingentityistheonethatitclaimstobe.Accesscontrol:Thepreventionofunauthorizeduseofaresource(i.e.,thisservicecontrolswhocanhaveaccesstoaresource,underwhatconditionsaccesscanoccur,andwhatthoseaccessingtheresourceareallowedtodo).Dataconfidentiality:Theprotectionofdatafromunauthorizeddisclosure.Dataintegrity:Theassurancethatdatareceivedareexactlyassentbyanauthorizedentity(i.e.,containnomodification,insertion,deletion,orreplay).Chapter1:Introduction..................................................................................................5Chapter2:ClassicalEncryptionTechniques...............................................................7Chapter3:BlockCiphersandtheDateEncryptionStandard................................13Chapter4:FiniteFields.................................................................................................21Chapter5:AdvancedEncryptionStandard..............................................................28Chapter6:MoreonSymmetricCiphers....................................................................33Chapter7:ConfidentialityUsingSymmetricEncryption.......................................38Chapter8:IntroductiontoNumberTheory..............................................................42Chapter9:Public-KeyCryptographyandRSA........................................................46Chapter10:KeyManagement;OtherPublic-KeyCryptosystems...........................55Chapter11:MessageAuthenticationandHashFunctions.......................................59Chapter12:HashandMACAlgorithms.....................................................................62Chapter13:DigitalSignaturesandAuthenticationProtocols..................................66Chapter14:AuthenticationApplications....................................................................71Chapter15:ElectronicMailSecurity............................................................................73Chapter16:IPSecurity...................................................................................................76Chapter17:WebSecurity...............................................................................................80Chapter18:Intruders......................................................................................................83Chapter19:MaliciousSoftware....................................................................................87Chapter20:Firewalls......................................................................................................89-2-Nonrepudiation:Providesprotectionagainstdenialbyoneoftheentitiesinvolvedinacommunicationofhavingparticipatedinallorpartofthecommunication.Availabilityservice:Thepropertyofasystemorasystemresourcebeingaccessibleandusableupondemandbyanauthorizedsystementity,accordingtoperformancespecificationsforthesystem(i.e.,asystemisavailableifitprovidesservicesaccordingtothesystemdesignwheneverusersrequestthem).1.5SeeTable1.3.-3-ANSWERSTOPROBLEMS1.1ReleaseofmessagecontentsTrafficanalysisMasqueradeReplayModificationofmessagesDenialofservicePeerentityauthenticationYDataoriginauthenticationYAccesscontrolYConfidentialityYTrafficflowconfidentialityYDataintegrityYYNon-repudiationYAvailabilityY1.2ReleaseofmessagecontentsTrafficanalysisMasqueradeReplayModificationofmessagesDenialofserviceEnciphermentYDigitalsignatureYYYAccesscontrolYYYYYDataintegrityYYAuthenticationexchangeYYYYTrafficpaddingYRoutingcontrolYYYNotarizationYYYCHAPTER2CLASSICALENCRYPTIONTECHNIQUESR-4-ANSWERSTOQUESTIONS2.1Plaintext,encryptionalgorithm,secretkey,ciphertext,decryptionalgorithm.2.2Permutationandsubstitution.2.3Onekeyforsymmetricciphers,twokeysforasymmetricciphers.2.4Astreamcipherisonethatencryptsadigitaldatastreamonebitoronebyteatatime.Ablockcipherisoneinwhichablockofplaintextistreatedasawholeandusedtoproduceaciphertextblockofequallength.2.5Cryptanalysisandbruteforce.2.6Ciphertextonly.Onepossibleattackunderthesecircumstancesisthebrute-forceapproachoftryingallpossiblekeys.Ifthekeyspaceisverylarge,thisbecomesimpractical.Thus,theopponentmustrelyonananalysisoftheciphertextitself,generallyapplyingvariousstatisticalteststoit.Knownplaintext.Theanalystmaybeabletocaptureoneormoreplaintextmessagesaswellastheirencryptions.Withthisknowledge,theanalystmaybeabletodeducethekeyonthebasiso

1 / 93
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功