- 1、本文档共105页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
密码编码学与网络安全习题答案
Solutions Manual
CRYPTOGRAPHY AND NETWORK SECURITY
Principles and Practice
Fourth Edition
William Stallings
Copyright 2006: William Stallings
? 2006 by William Stallings
All rights reserved. No part of this document may be reproduced, in any form or by any means, or posted on the Internet, without permission in writing from the author.
Notice
This manual contains solutions to all of the review questions and homework problems in Cryptography and Network Security, Fourth Edition. If you spot an error in a solution or in the wording of a problem, I would greatly appreciate it if you would forward the information via email to ws@. An errata sheet for this manual, if needed, is available at /members/w/s/ws/S.
W.S.
TABLE OF CONTENTS
Chapter 1: Introduction 5
Chapter 2: Classical Encryption Techniques 7
Chapter 3: Block Ciphers and the Date Encryption Standard 13
Chapter 4: Finite Fields 21
Chapter 5: Advanced Encryption Standard 28
Chapter 6: More on Symmetric Ciphers 33
Chapter 7: Confidentiality Using Symmetric Encryption 38
Chapter 8: Introduction to Number Theory 42
Chapter 9: Public-Key Cryptography and RSA 46
Chapter 10: Key Management; Other Public-Key Cryptosystems 55
Chapter 11: Message Authentication and Hash Functions 59
Chapter 12: Hash and MAC Algorithms 62
Chapter 13: Digital Signatures and Authentication Protocols 66
Chapter 14: Authentication Applications 71
Chapter 15: Electronic Mail Security 73
Chapter 16: IP Security 76
Chapter 17: Web Security 80
Chapter 18: Intruders 83
Chapter 19: Malicious Software 87
Chapter 20: Firewalls 89
Chapter 1
Introduction
Answers to Questions
1.1 The OSI Security Architecture is a framework that provides a systematic way of defining the requirements for security and characterizing the approaches to satisfying those requirements. The document defines security attacks, mechanisms, and services, and the relationships among these categories.
1.2 Passive attacks have to do with eavesdropping on, or monitoring, transmi
1亿VIP精品文档
相关文档
最近下载
- 中职班主任能力大赛一等奖班级建设方案(精品).docx
- 华泰美吉特灯都资产支持专项计划说明书-20160529-clean.pdf
- 2024北京石景山初三上期末化学试卷及答案.docx VIP
- 2024年学习新修订的《中国共产党纪律处分条例》题库及答案.docx VIP
- 乙二醇乙醚醋酸酯化学品安全技术说明书.doc
- 飞利浦Avance Collection 家用面条机 全自动面条机hr2356_31使用说明书.pdf
- 爱祖国爱家乡爱学校主题班会PPT课件.pptx VIP
- 全国生态环境监测专业技术人员大比武理论考试题库资料-5 土壤沉积物固废.pdf
- 知识城市理念下深圳大学城功能构成优化策略分析.pdf VIP
- XX石化公司智慧工厂解决方案课件.ppt
文档评论(0)