- 109
- 0
- 约16.44万字
- 约 95页
- 2017-12-02 发布于湖北
- 举报
密码编码学与网络安全(第五版)英文答案
Chapter 1: Introduction 5
Chapter 2: Classical Encryption Techniques 7
Chapter 3: Block Ciphers and the Date Encryption Standard 13
Chapter 4: Finite Fields 21
Chapter 5: Advanced Encryption Standard 28
Chapter 6: More on Symmetric Ciphers 33
Chapter 7: Confidentiality Using Symmetric Encryption 38
Chapter 8: Introduction to Number Theory 42
Chapter 9: Public-Key Cryptography and RSA 46
Chapter 10: Key Management; Other Public-Key Cryptosystems 55
Chapter 11: Message Authentication and Hash Functions 59
Chapter 12: Hash and MAC Algorithms 62
Chapter 13: Digital Signatures and Authentication Protocols 66
Chapter 14: Authentication Applications 71
Chapter 15: Electronic Mail Security 73
Chapter 16: IP Security 76
Chapter 17: Web Security 80
Chapter 18: Intruders 83
Chapter 19: Malicious Software 87
Chapter 20: Firewalls 89
Answers to Questions
1.1 The OSI Security Architecture is a framework that provides a systematic way of defining the requirements for security and characterizing the approaches to satisfying those requirements. The document defines security attacks, mechanisms, and services, and the relationships among these categories.
1.2 Passive attacks have to do with eavesdropping on, or monitoring, transmissions. Electronic mail, file transfers, and client/server exchanges are examples of transmissions that can be monitored. Active attacks include the modification of transmitted data and attempts to gain unauthorized access to computer systems.
1.3 Passive attacks: release of message contents and traffic analysis. Active attacks: masquerade, replay, modification of messages, and denial of service.
1.4 Authentication: The assurance that the communicating entity is the one that it claims to be.
Access control: The prevention of unauthorized use of a resource (i.e., this service controls who can have access to a resource, under what conditions access can occur, and what those accessing the resource are allowed to do).
Data confidentiality: The protection of d
您可能关注的文档
- 实验二 直流发电机实验.ppt
- 实验十 烷、烯、炔、芳香烃、卤代烃及醇的化学鉴定.ppt
- 实验六 QuartusII_软件使用(lzg).ppt
- 实验四(华电版).docx
- 实验五-模拟黑客攻击.doc
- 实验六 风味豆豉的制作(个人设计2011).ppt
- 实验基础:电流表、电压表的读数.ppt
- 实验室安全管理制度及流程 一.doc
- 实验室不常见矿物图片特征.ppt
- 实验八、九 微生物的生理生化反应.ppt
- 伟明环保-市场前景及投资研究报告-境内业务稳健运行,印尼市场贡献边际增量.pdf
- 桂东县法院系统招聘考试真题2025.pdf
- 贵州省黔南布依族2026年中考三模物理试题及答案.pdf
- 贵州省黔南州2026年中考语文二模试卷附答案.pdf
- 贵州省铜仁市2026年中考语文二模试卷附答案.pdf
- 2026上半年安徽事业单位联考合肥市庐江县招聘36人备考题库及一套完整答案详解.docx
- 贵州省毕节市2026年中考语文一模试卷附答案.pdf
- 贵州省贵阳市南明区2026年中考语文一模试卷附答案.pdf
- 2026上半年安徽事业单位联考合肥市庐江县招聘36人备考题库及一套参考答案详解.docx
- 贵州省贵阳市白云区2026年中考二模物理试题附答案.pdf
原创力文档

文档评论(0)