密码编码学与网络安全(第五版)答案.docx

上传人:聆听****声音 文档编号:275292 上传时间:2023-04-28 格式:DOCX 页数:93 大小:231.28KB
下载 相关 举报
密码编码学与网络安全(第五版)答案.docx_第1页
第1页 / 共93页
密码编码学与网络安全(第五版)答案.docx_第2页
第2页 / 共93页
密码编码学与网络安全(第五版)答案.docx_第3页
第3页 / 共93页
密码编码学与网络安全(第五版)答案.docx_第4页
第4页 / 共93页
密码编码学与网络安全(第五版)答案.docx_第5页
第5页 / 共93页
密码编码学与网络安全(第五版)答案.docx_第6页
第6页 / 共93页
密码编码学与网络安全(第五版)答案.docx_第7页
第7页 / 共93页
密码编码学与网络安全(第五版)答案.docx_第8页
第8页 / 共93页
密码编码学与网络安全(第五版)答案.docx_第9页
第9页 / 共93页
密码编码学与网络安全(第五版)答案.docx_第10页
第10页 / 共93页
密码编码学与网络安全(第五版)答案.docx_第11页
第11页 / 共93页
密码编码学与网络安全(第五版)答案.docx_第12页
第12页 / 共93页
密码编码学与网络安全(第五版)答案.docx_第13页
第13页 / 共93页
密码编码学与网络安全(第五版)答案.docx_第14页
第14页 / 共93页
密码编码学与网络安全(第五版)答案.docx_第15页
第15页 / 共93页
密码编码学与网络安全(第五版)答案.docx_第16页
第16页 / 共93页
密码编码学与网络安全(第五版)答案.docx_第17页
第17页 / 共93页
密码编码学与网络安全(第五版)答案.docx_第18页
第18页 / 共93页
密码编码学与网络安全(第五版)答案.docx_第19页
第19页 / 共93页
密码编码学与网络安全(第五版)答案.docx_第20页
第20页 / 共93页
亲,该文档总共93页,到这儿已超出免费预览范围,如果喜欢就下载吧!
下载资源
资源描述

密码编码学与网络安全(第五版)答案.docx

《密码编码学与网络安全(第五版)答案.docx》由会员分享,可在线阅读,更多相关《密码编码学与网络安全(第五版)答案.docx(93页珍藏版)》请在冰点文库上搜索。

密码编码学与网络安全(第五版)答案.docx

Chapter1:

Introduction 5

Chapter2:

ClassicalEncryptionTechniques 7

Chapter3:

BlockCiphersandtheDateEncryptionStandard 13

Chapter4:

FiniteFields 21

Chapter5:

AdvancedEncryptionStandard 28

Chapter6:

MoreonSymmetricCiphers 33

Chapter7:

ConfidentialityUsingSymmetricEncryption 38

Chapter8:

IntroductiontoNumberTheory 42

Chapter9:

Public-KeyCryptographyandRSA 46

Chapter10:

KeyManagement;OtherPublic-KeyCryptosystems 55

Chapter11:

MessageAuthenticationandHashFunctions 59

Chapter12:

HashandMACAlgorithms 62

Chapter13:

DigitalSignaturesandAuthenticationProtocols 66

Chapter14:

AuthenticationApplications 71

Chapter15:

ElectronicMailSecurity 73

Chapter16:

IPSecurity 76

Chapter17:

WebSecurity 80

Chapter18:

Intruders 83

Chapter19:

MaliciousSoftware 87

Chapter20:

Firewalls 89

AnswerstoQuestions

1.1 TheOSISecurityArchitectureisaframeworkthatprovidesasystematicwayofdefiningtherequirementsforsecurityandcharacterizingtheapproachestosatisfyingthoserequirements.Thedocumentdefinessecurityattacks,mechanisms,andservices,andtherelationshipsamongthesecategories.

1.2 Passiveattackshavetodowitheavesdroppingon,ormonitoring,transmissions.Electronicmail,filetransfers,andclient/serverexchangesareexamplesoftransmissionsthatcanbemonitored.Activeattacksincludethemodificationoftransmitteddataandattemptstogainunauthorizedaccesstocomputersystems.

1.3 Passiveattacks:

releaseofmessagecontentsandtrafficanalysis.Activeattacks:

masquerade,replay,modificationofmessages,anddenialofservice.

1.4 Authentication:

Theassurancethatthecommunicatingentityistheonethatitclaimstobe.

Accesscontrol:

Thepreventionofunauthorizeduseofaresource(i.e.,thisservicecontrolswhocanhaveaccesstoaresource,underwhatconditionsaccesscanoccur,andwhatthoseaccessingtheresourceareallowedtodo).

Dataconfidentiality:

Theprotectionofdatafromunauthorizeddisclosure.

Dataintegrity:

Theassurancethatdatareceivedareexactlyassentbyanauthorizedentity(i.e.,containnomodification,insertion,deletion,orreplay).

Nonrepudiation:

Providesprotectionagainstdenialbyoneoftheentitiesinvolvedinacommunicationofhavingparticipatedinallorpartofthecommunication.

Availabilityservice:

Thepropertyofasystemorasystemresourcebeingaccessibleandusableupondemandbyanauthorizedsystementity,accordingtoperformancespecificationsforthesystem(i.e.,asystemisavailableifitprovidesservicesaccordingtothesystemdesignwheneverusersrequestthem).

1.5 SeeTable1.3.

AnswerstoProblems

1.1

Releaseofmessagecontents

Trafficanalysis

Masquerade

Replay

Modificationofmessages

Denialofservice

Peerentityauthentication

Y

Dataoriginauthentication

Y

Accesscontrol

Y

Confidentiality

Y

Trafficflowconfidentiality

Y

Dataintegrity

Y

Y

Non-repudiation

Y

Availability

Y

1.2

Releaseofmessagecontents

Trafficanalysis

Masquerade

Replay

Modificationofmessages

Denialofservice

Encipherment

Y

Digitalsignature

Y

Y

Y

Accesscontrol

Y

Y

Y

Y

Y

Dataintegrity

Y

Y

Authenticationexchange

Y

Y

Y

Y

Trafficpadding

Y

Routingcontrol

Y

Y

Y

Notarization

Y

Y

Y

Chapter2

ClassicalEncryptionTechniquesr

AnswerstoQuestions

2.1 Plaintext,encryptionalgorithm,secretkey,ciphertext,decryptionalgorithm.

2.2 Permutationandsubstitution.

2.3 Onekeyforsymmetricciphers,twokeysforasymmetricciphers.

2.4 Astreamcipherisonethatencryptsadigitaldatastreamonebitoronebyteatatime.Ablockcipherisoneinwhichablockofplaintextistreatedasawholeandusedtoproduceaciphertextblockofequallength.

2.5 Cryptanalysisandbruteforce.

2.6 Ciphertextonly.Onepossibleattackunderthesecircumstancesisthebrute-forceapproachoftryingallpossiblekeys.Ifthekeyspaceisverylarge,thisbecomesimpractical.Thus,theopponentmustrelyonananalysisoftheciphertextitself,generallyapplyingvariousstatisticalteststoit.Knownplaintext.Theanalystmaybeabletocaptureoneormoreplaintextmessagesaswellastheirencryptions.Withthisknowledge,theanalystmaybeabletodeducethekeyonthebasisofthewayinwhichtheknownplaintextistransformed.Chosenplaintext.Iftheanalystisabletochoosethemessagestoencrypt,theanalystmaydeliberatelypickpatternsthatcanbeexpectedtorevealthestructureofthekey.

2.7 Anencryptionschemeisunconditionallysecureiftheciphertextgeneratedbytheschemedoesnotcontainenoughinformationtodetermineuniquelythecorrespondingplaintext,nomatterhowmuchciphertextisavailable.Anencryptionschemeissaidtobecomputationallysecureif:

(1)thecostofbreakingthecipherexceedsthevalueoftheencryptedinformation,and

(2)thetimerequiredtobreakthecipherexceedstheusefullifetimeoftheinformation.

2.8 TheCaesarcipherinvolvesreplacingeachletterofthealphabetwiththeletterstandingkplacesfurtherdownthealphabet,forkintherange1through25.

2.9 Amonoalphabeticsubstitutionciphermapsaplaintextalphabettoaciphertextalphabet,sothateachletteroftheplaintextalphabetmapstoasingleuniqueletteroftheciphertextalphabet.

2.10 ThePlayfairalgorithmisbasedontheuseofa5´5matrixoflettersconstructedusingakeyword.Plaintextisencryptedtwolettersatatimeusingthismatrix.

2.11 Apolyalphabeticsubstitutioncipherusesaseparatemonoalphabeticsubstitutioncipherforeachsuccessiveletterofplaintext,dependingonakey.

2.12 1.Thereisthepracticalproblemofmakinglargequantitiesofrandomkeys.Anyheavilyusedsystemmightrequiremillionsofrandomcharactersonaregularbasis.Supplyingtrulyrandomcharactersinthisvolumeisasignificanttask.

2.Evenmoredauntingistheproblemofkeydistributionandprotection.Foreverymessagetobesent,akeyofequallengthisneededbybothsenderandreceiver.Thus,amammothkeydistributionproblemexists.

2.13 Atranspositioncipherinvolvesapermutationoftheplaintextletters.

2.14 Steganographyinvolvesconcealingtheexistenceofamessage.

AnswerstoProblems

2.1 a. No.Achangeinthevalueofbshiftstherelationshipbetweenplaintextlettersandciphertextletterstotheleftorrightuniformly,sothatifthemappingisone-to-oneitremainsone-to-one.

b. 2,4,6,8,10,12,13,14,16,18,20,22,24.Anyvalueofalargerthan25isequivalenttoamod26.

c. Thevaluesofaand26musthavenocommonpositiveintegerfactorotherthan1.Thisisequivalenttosayingthataand26arerelativelyprime,orthatthegreatestcommondivisorofaand26is1.Toseethis,firstnotethatE(a,p)=E(a,q)(0≤p≤q<26)ifandonlyifa(p–q)isdivisibleby26.1.Supposethataand26arerelativelyprime.Then,a(p–q)isnotdivisibleby26,becausethereisnowaytoreducethefractiona/26and(p–q)islessthan26.2.Supposethataand26haveacommonfactork>1.ThenE(a,p)=E(a,q),ifq=p+m/k≠p.

2.2 Thereare12allowablevaluesofa(1,3,5,7,9,11,15,17,19,21,23,25).Thereare26allowablevaluesofb,from0through25).ThusthetotalnumberofdistinctaffineCaesarciphersis12´26=312.

2.3 Assumethatthemostfrequentplaintextletteriseandthesecondmostfrequentletterist.Notethatthenumericalvaluesaree=4;B=1;t=19;U=20.Thenwehavethefollowingequations:

1=(4a+b)mod26

20=(19a+b)mod26

Thus,19=15amod26.Bytrialanderror,wesolve:

a=3.

Then1=(12+b)mod26.Byobservation,b=15.

2.4 AgoodglassintheBishop'shostelintheDevil'sseat—twenty-onedegreesandthirteenminutes—northeastandbynorth—mainbranchseventhlimbeastside—shootfromthelefteyeofthedeath'shead—abeelinefromthetreethroughtheshotfiftyfeetout.(fromTheGoldBug,byEdgarAllanPoe)

2.5 a. ThefirstlettertcorrespondstoA,thesecondletterhcorrespondstoB,eisC,sisD,andsoon.Secondandsubsequentoccurrencesofaletterinthekeysentenceareignored.Theresult

ciphertext:

SIDKHKDMAFHCRKIABIESHIMCKDLFEAILA

plaintext:

basilisktoleviathanblakeiscontact

b. Itisamonalphabeticcipherandsoeasilybreakable.

c. Thelastsentencemaynotcontainallthelettersofthealphabet.Ifthefirstsentenceisused,thesecondandsubsequentsentencesmayalsobeuseduntilall26lettersareencountered.

2.6 Thecipherreferstothewordsinthepageofabook.Thefirstentry,534,referstopage534.Thesecondentry,C2,referstocolumntwo.Theremainingnumbersarewordsinthatcolumn.ThenamesDOUGLASandBIRLSTONEaresimplywordsthatdonotappearonthatpage.Elementary!

(fromTheValleyofFear,bySirArthurConanDoyle)

2.7 a.

2

8

10

7

9

6

3

1

4

5

C

R

Y

P

T

O

G

A

H

I

B

E

A

T

T

H

E

T

H

I

R

D

P

I

L

L

A

R

F

R

O

M

T

H

E

L

E

F

T

O

U

T

S

I

D

E

T

H

E

L

Y

C

E

U

M

T

H

E

A

T

R

E

T

O

N

I

G

H

T

A

T

S

E

V

E

N

I

F

Y

O

U

A

R

E

D

I

S

T

R

U

S

T

F

U

L

B

R

I

N

G

T

W

O

F

R

I

E

N

D

S

4

2

8

10

5

6

3

7

1

9

N

E

T

W

O

R

K

S

C

U

T

R

F

H

E

H

F

T

I

N

B

R

O

U

Y

R

T

U

S

T

E

A

E

T

H

G

I

S

R

E

H

F

T

E

A

T

Y

R

N

D

I

R

O

L

T

A

O

U

G

S

H

L

L

E

T

I

N

I

B

I

T

I

H

I

U

O

V

E

U

F

E

D

M

T

C

E

S

A

T

W

T

L

E

D

M

N

E

D

L

R

A

P

T

S

E

T

E

展开阅读全文
相关资源
猜你喜欢
相关搜索
资源标签

当前位置:首页 > 自然科学 > 物理

copyright@ 2008-2023 冰点文库 网站版权所有

经营许可证编号:鄂ICP备19020893号-2