当前位置:文档之家› 密码编码学与网络安全-原理与实践 课后答案

密码编码学与网络安全-原理与实践 课后答案

本资源来自数缘社区 :81
欢迎来到数缘社区。本社区是一个高等数学及密码学的技术性论坛,由山东大学数学院研究 生创办。在这里您可以尽情的遨游数学的海洋。作为站长,我诚挚的邀请您加入,希望大家能一 起支持发展我们的论坛,充实每个版块。把您宝贵的资料与大家一起分享!
Third Edition WILLIAM STALLINGS
Copyright 2002: William Stallings -1-
TABLE OF CONTENTS
Chapter 2: Chaphapter 6: Chapter 7: Chapter 8: Chapter 9: Chapter 10: Chapter 11: Chapter 12: Chapter 13: Chapter 14: Chapter 15: Chapter 16: Chapter 17: Chapter 18: Chapter 19: Chapter 20:
time. A block cipher is one in which a block of plaintext is treated as a whole and used to produce a ciphertext block of equal length. 2.5 Cryptanalysis and brute force. 2.6 Ciphertext only. One possible attack under these circumstances is the brute-force approach of trying all possible keys. If the key space is very large, this becomes impractical. Thus, the opponent must rely on an analysis of the ciphertext itself, generally applying various statistical tests to it. Known plaintext. The analyst may be able to capture one or more plaintext messages as well as their encryptions. With this knowledge, the analyst may be able to deduce the key on the basis of the way in which the known plaintext is transformed. Chosen plaintext. If the analyst is able to choose the messages to encrypt, the analyst may deliberately pick patterns that can be expected to reveal the structure of the key. 2.7 An encryption scheme is unconditionally secure if the ciphertext generated by the scheme does not contain enough information to determine uniquely the corresponding plaintext, no matter how much ciphertext is available. An encryption scheme is said to be computationally secure if: (1) the cost of breaking the cipher exceeds the value of the encrypted information, and (2) the time required to break the cipher exceeds the useful lifetime of the information. 2.8 The Caesar cipher involves replacing each letter of the alphabet with the letter standing k places further down the alphabet, for k in the range 1 through 25. 2.9 A monoalphabetic substitution cipher maps a plaintext alphabet to a ciphertext alphabet, so that each letter of the plaintext alphabet maps to a single unique letter of the ciphertext alphabet. 2.10 The Playfair algorithm is based on the use of a 5 ¥ 5 matrix of letters constructed using a keyword. Plaintext is encrypted two letters at a time using this matrix. 2.11 A polyalphabetic substitution cipher uses a separate monoalphabetic substitution cipher for each successive letter of plaintext, depending on a key.
网络公式编辑器 数缘社区公式编辑器采用 Latex 语言,适用于任何支持图片格式的论坛或网页。在本论坛编 辑好公式后,您可以将自动生成的公式图片的链接直接复制到你要发的帖子里以图片的形式发 表。
如果您觉得本站对您的学习和成长有所帮助,请把它添加到您的收藏夹。如果您对本论坛有 任何的意见或者建议,请来论坛留下您宝贵的意见。
附录 A:本站电子书库藏书目录 :81/bbs/dispbbs.asp?boardID=18&ID=2285
附录 B:版权问题 数缘社区所有电子资源均来自网络,版权归原作者所有,本站不承担任何版权责任。
SOLUTIONS MANUAL
CRYPTOGRAPHY AND NETWORK SECURITY
Classical Encryption Techniques ...............................................................4 Block Ciphers and the Date Encryption Standard...................................8 Introduction to Finite Fields.....................................................................15 Advanced Encryption Standard ..............................................................20 Contemporary Symmetric Ciphers..........................................................25 Confidentiality Using Symmetric Encryption .......................................30 Introduction to Number Theory ..............................................................33 Public-Key Cryptography and RSA ........................................................37 Key Management; Other Public-Key Cryptosystems...........................42 Message Authentication and Hash Functions .......................................45 Hash and MAC Algorithms......................................................................48 Digital Signatures and Authentication Protocols..................................50 Authentication Applications ....................................................................54 Electronic Mail Security ............................................................................57 IP Security ...................................................................................................60 Web Security...............................................................................................65 Intruders ......................................................................................................68 Malicious Software.....................................................................................72 Firewalls ......................................................................................................74
相关主题