如果您无法下载资料,请参考说明:
1、部分资料下载需要金币,请确保您的账户上有足够的金币
2、已购买过的文档,再次下载不重复扣费
3、资料包下载后请先用软件解压,在使用对应软件打开
密码编码学与网络安全答案优质资料(可以直接使用,可编辑优质资料,欢迎下载)Chapter1:Introduction5Chapter2:ClassicalEncryptionTechniques7Chapter3:BlockCiphersandtheDateEncryptionStandard13Chapter4:FiniteFields21Chapter5:AdvancedEncryptionStandard28Chapter6:MoreonSymmetricCiphers33Chapter7:ConfidentialityUsingSymmetricEncryption38Chapter8:IntroductiontoNumberTheory42Chapter9:Public-KeyCryptographyandRSA46Chapter10:KeyManagement;OtherPublic-KeyCryptosystems55Chapter11:MessageAuthenticationandHashFunctions59Chapter12:HashandMACAlgorithms62Chapter13:DigitalSignaturesandAuthenticationProtocols66Chapter14:AuthenticationApplications71Chapter15:ElectronicMailSecurity73Chapter16:IPSecurity76Chapter17:WebSecurity80Chapter18:Intruders83Chapter19:MaliciousSoftware87Chapter20:Firewalls89AnswerstoQuestions1.1TheOSISecurityArchitectureisaframeworkthatprovidesasystematicwayofdefiningtherequirementsforsecurityandcharacterizingtheapproachestosatisfyingthoserequirements.Thedocumentdefinessecurityattacks,mechanisms,andservices,andtherelationshipsamongthesecategories.1.2Passiveattackshavetodowitheavesdroppingon,ormonitoring,transmissions.Electronicmail,filetransfers,andclient/serverexchangesareexamplesoftransmissionsthatcanbemonitored.Activeattacksincludethemodificationoftransmitteddataandattemptstogainunauthorizedaccesstocomputersystems.1.3Passiveattacks:releaseofmessagecontentsandtrafficanalysis.Activeattacks:masquerade,replay,modificationofmessages,anddenialofservice.1.4Authentication:Theassurancethatthecommunicatingentityistheonethatitclaimstobe.Accesscontrol:Thepreventionofunauthorizeduseofaresource(i.e.,thisservicecontrolswhocanhaveaccesstoaresource,underwhatconditionsaccesscanoccur,andwhatthoseaccessingtheresourceareallowedtodo).Dataconfidentiality:Theprotectionofdatafromunauthorizeddisclosure.Dataintegrity:Theassurancethatdatareceivedareexactlyassentbyanauthorizedentity(i.e.,containnomodification,insertion,deletion,orreplay).Nonrepud