付費下載
下載本文檔
版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)
文檔簡介
《網(wǎng)絡安全技術(shù)》英文習題集Chapter1IntroductionANSWERSNSWERSTOQUESTIONSWhatistheOSIsecurityarchitecture?TheOSISecurityArchitectureisaframeworkthatprovidesasystematicwayofdefiningtherequirementsforsecurityandcharacterizingtheapproachestosatisfyingthoserequirements.Thedocumentdefinessecurityattacks,mechanisms,andservices,andtherelationshipsamongthesecategories.Whatisthediffereneebetweenpassiveandactivesecuritythreats?Passiveattackshavetodowitheavesdroppingon,ormonitoring,transmissions.Electronicmail,filetransfers,andclient/serverexchangesareexamplesoftransmissionsthatcanbemonitored.Activeattacksincludethemodificationoftransmitteddataandattemptstogainunauthorizedaccesstocomputersystems.Listsandbrieflydefinecategoriesofpassiveandactivesecurityattacks?Passiveattacks:releaseofmessagecontentsandtrafficanalysis.Activeattacks:masquerade,replay,modificationofmessages,anddenialofservice.Listsandbrieflydefinecategoriesofsecurityservice?Authentication :Theassuraneethatthecommunicatingentityistheonethatitclaimstobe.Accesscontrol:Thepreventionofunauthorizeduseofaresource(i.e.,thisservicecontrolswhocanhaveaccesstoaresource,underwhatconditionsaccesscanoccur,andwhatthoseaccessingtheresourceareallowedtodo).Dataconfidentiality:Theprotectionofdatafromunauthorizeddisclosure.Dataintegrity:Theassuraneethatdatareceivedareexactlyassentbyanauthorizedentity(i.e.,containnomodification,insertion,deletion,orreplay).Nonrepudiation:ProvidesprotectionagainstdenialbyoneoftheentitiesinvoIvedinacommunicationofhavingparticipatedinallorpartofthecommunication.2.12Whatisakeydistributioncenter?2.12Whatisakeydistributioncenter?2.7Whatistripleencryption?2.7Whatistripleencryption?Availabilityservice:Thepropertyofasystemorasystemresourcebeingaccessibleandusableupondemandbyanauthorizedsystementity,accordingtoperformaneespecificationsforthesystem(i.e.,asystemisavailableifitprovidesservicesaccordingtothesystemdesignwheneverusersrequestthem).Chapter2SymmetricEncryptionandMessageConfidentialityANSWERSNSWERSTOQUESTIONSWhataretheessentialingredientsofasymmetriccipher?Plaintext,encryptionalgorithm,secretkey,ciphertext,decryptionalgorithm.Whatarethetwobasicfunctionsusedinencryptionalgorithms?Permutationandsubstitution.Howmanykeysarerequiredfortwopeopletocommunicateviaasymmetriccipher?Onesecretkey.Whatisthediffereneebetweenablockcipherandastreamcipher?Astreamcipherisonethatencryptsadigitaldatastreamonebitoronebyteatatime.Ablockcipherisoneinwhichablockofplaintextistreatedasawholeandusedtoproduceaciphertextblockofequallength.Whatarethetwogeneralapproachestoattackingacipher?Cryptanalysisandbruteforce.Whydosomeblockciphermodesofoperationonlyuseencryptionwhileothersusebothencryptionanddecryption?Insomemodes,theplaintextdoesnotpassthroughtheencryptionfunction,butisXORedwiththeoutputoftheencryptionfunction.Themathworksoutthatfordecryptioninthesecases,theencryptionfunctionmustalsobeused.Withtripleencryption,aplaintextblockisencryptedbypassingitthroughanencryptionalgorithm;theresultisthenpassedthroughthesameencryptionalgorithmagain;theresultofthesecondencryptionispassedthroughthesameencryptionalgorithmathirdtime.Typically,thesecondstageusesthedecryptionalgorithmratherthantheencryptionalgorithm.Whyisthemiddleportionof3DESadecryptionratherthananencryption?Thereisnocryptographicsignificaneetotheuseofdecryptionforthesecondstage.Itsonlyadvantageisthatitallowsusersof3DEStodecryptdataencryptedbyusersoftheoldersingleDESbyrepeatingthekey.Whatisthediffereneebetweenlinkandend-to-endencryption?Withlinkencryption,eachvulnerablecommunicationslinkisequippedonbothendswithanencryptiondevice.Withend-to-endencryption,theencryptionprocessiscarriedoutatthetwoendsystems.Thesourcehostorterminalencryptsthedata;thedatainencryptedformarethentransmittedunalteredacrossthenetworktothedestinationterminalorhost.Listwaysinwhichsecretkeyscanbedistributedtotwocommunicatingparties.FortwopartiesAandB,keydistributioncanbeachievedinanumberofways,asfollows:AcanselectakeyandphysicallydeliverittoB.AthirdpartycanselectthekeyandphysicallydeliverittoAandB.lfAandBhavepreviouslyandrecentlyusedakey,onepartycantransmitthenewkeytotheother,encryptedusingtheoldkey.IfAandBeachhasanencryptedconnectiontoathirdpartyC,CcandeliverakeyontheencryptedlinkstoAandB.Whatisthediffereneebetweenasessionkeyandamasterkey?Asessionkeyisatemporaryencryptionkeyusedbetweentwoprincipals.AmasterkeyisaIong-lastingkeythatisusedbetweenakeydistributioncenterandaprincipalforthepurposeofencodingthetransmissionofsessionkeys.Typically,themasterkeysaredistributedbynoncryptographicmeans.3.2Whatismessageauthenticationcode?3.2Whatismessageauthenticationcode?Akeydistributioncenterisasystemthatisauthorizedtotransmittemporarysessionkeystoprincipals.Eachsessionkeyistransmittedinencryptedform,usingamasterkeythatthekeydistributioncentershareswiththetargetprincipal.ANSWERSNSWERSTOPROBLEMSWhatRC4keyvaluewillleaveSunchangedduringinitialization?Thatis,aftertheinitialpermutationofS,theentriesofSwillbeequaltothevaluesfrom0through255inascendingorder.Useakeyoflength255bytes.Thefirsttwobytesarezero;thatisK[0]=K[1]=0.Thereafter,wehave:K[2]=255;K[3]=254; …K[255]=2.Ifabiterroroccursinthetransmissionofaciphertextcharacterin8-bitCFBmode,howfardoestheerrorpropagate?Nineplaintextcharactersareaffected.Theplaintextcharactercorrespondingtotheciphertextcharacterisobviouslyaltered.Inaddition,thealteredciphertextcharacterenterstheshiftregisterandisnotremoveduntilthenexteightcharactersareprocessed.Keydistributionschemesusinganaccesscontrolcenterand/orakeydistributioncenterhavecentralpointsvulnerabletoattack.Discussthesecurityimplicationsofsuchcentralization.Thecentralpointsshouldbehighlyfault-tolerant,shouldbephysicallysecured,andshouldusetrustedhardware/software.Chapter3Public-Key CryptographyandMessageAuthenticationANSWERSNSWERSTOQUESTIONSListthreeapproachestomessageauthentication.Messageencryption,messageauthenticationcode,hashfunction.Anauthenticatorthatisacryptographicfunctionofboththedatatobeauthenticatedandasecretkey.BrieflydescribethethreeschemesillustratedinFigture3.2.(a)Ahashcodeiscomputedfromthesourcemessage,encryptedusingsymmetricencryptionandasecretkey,andappendedtothemessage.Atthereceiver,thesamehashcodeiscomputed.Theincomingcodeisdecryptedusingthesamekeyandcomparedwiththecomputedhashcode.(b)Thisisthesameprocedureasin(a)exceptthatpublic-keyencryptionisused;thesenderencryptsthehashcodewiththesender'sprivatekey,andthereceiverdecryptsthehashcodewiththesender'spublickey.(c)Asecretvalueisappendedtoamessageandthenahashcodeiscalculatedusingthemessageplussecretvalueasinput.Thenthemessage(withoutthesecretvalue)andthehashcodearetransmitted.Thereceiverappendsthesamesecretvaluetothemessageandcomputesthehashvalueoverthemessageplussecretvalue.Thisisthencomparedtothereceivedhashcode.Whatpropertiesmustahashfunctionhavetobeusefulformessageauthentication?Hcanbeappliedtoablockofdataofanysize.Hproducesafixed-lengthoutput.H(x)isrelativelyeasytocomputeforanygivenx,makingbothhardwareandsoftwareimplementationspractical.Foranygivenvalueh,itiscomputationallyinfeasibletofindxsuchthatH(x)=h.Thisissometimesreferredtointheliteratureastheone-wayproperty.Foranygivenblockx,itiscomputationallyinfeasibletofindy工xwithH(y)=H(x).Itiscomputationallyinfeasibletofindanypair(x,y)suchthatH(x)=H(y).Inthecontextofahashfunction,whatisacompressionfunction?Thecompressionfunctionisthefundamentalmodule,orbasicbuildingblock,ofahashfunction.Thehashfunctionconsistsofiteratedapplicationofthecompressionfunction.Whataretheprincipalingredientsofapublic-keycryptosystem?Plaintext:Thisisthereadablemessageordatathatisfedintothealgorithmasinput.Encryptionalgorithm:Theencryptionalgorithmperformsvarioustransformationsontheplaintext.Publicandprivatekeys:Thisisapairofkeysthathavebeenselectedsothatifoneisusedforencryption,theotherisusedfordecryption.Theexacttransformationsperformedbytheencryptionalgorithmdependonthepublicorprivatekeythatisprovidedasinput.Ciphertext:Thisisthescrambledmessageproducedasoutput.Itdependsontheplaintextandthekey.Foragivenmessage,twodifferentkeyswillproducetwodifferentciphertexts.Decryptionalgorithm:Thisalgorithmacceptstheciphertextandthematchingkeyandproducestheoriginalplaintext.Listandbrieflydefinethreeusesofapublic-keycryptosystem.Encryption/decryption:Thesenderencryptsamessagewiththerecipient'spublickey.Digitalsignature:Thesender"signs"amessagewithitsprivatekey.Signingisachievedbyacryptographicalgorithmappliedtothemessageortoasmallblockofdatathatisafunctionofthemessage.Keyexchange:Twosidescooperatetoexchangeasessionkey.Severaldifferentapproachesarepossible,involvingtheprivatekey(s)ofoneorbothparties.3.8Whatisthediffereneebetweenaprivatekeyandasecretkey?Thekeyusedinconventionalencryptionistypicallyreferredtoasasecretkey.Thetwokeysusedforpublic-keyencryptionarereferredtoasthepublickeyandtheprivatekey.3.9Whatisdigitalsignature?Adigitalsignatureisanauthenticationmechanismthatenablesthecreatorofamessagetoattachacodethatactsasasignature.Thesignatureisformedbytakingthehashofthemessageandencryptingthemessagewiththecreator'sprivatekey.Thesignatureguaranteesthesourceandintegrityofthemessage.Whatisapublic-keycertificate?Apubic-keycertificateconsistsofapublickeyplusaUserIDofthekeyowner,withthewholeblocksignedbyatrustedthirdparty.Typically,thethirdpartyisacertificateauthority(CA)thatistrustedbytheusercommunity,suchasagovernmentagencyorafinancialinstitution.Howcanpublic-keyencryptionbeusedtodistributeasecretkey?Severaldifferentapproachesarepossible,involvingtheprivatekey(s)ofoneorbothparties.OneapproachisDiffie-Hellmankeyexchange.Anotherapproachisforthesendertoencryptasecretkeywiththerecipient'spublickey.ANSWERSNSWERSTOPROBLEMSConsidera32-bithashfunctiondefinedastheconcatenationoftwo16-bitfunctions:XORandRXOR,definedinSection3.2as “twosimpiehashfunction.”Willthischecksumdetectallerrorscausedbyanoddnumberoferrorbits?Explain.Willthischecksumdetectallerrorscausedbyanevennumberoferrorbits?Ifnot,characterizetheerrorpatternsthatwillcausethechecksumtofail.Commentsontheeffectivenessofthisfunctionforuseahashfunctionsforauthentication.Yes.TheXORfunctionissimplyaverticalparitycheck.Ifthereisanoddnumberoferrors,thentheremustbeatleastonecolumnthatcontainsanoddnumberoferrors,andtheparitybitforthatcolumnwilldetecttheerror.NotethattheRXORfunctionalsocatchesallerrorscausedbyanoddnumberoferrorbits.EachRXORbitisafunctionofaunique"spiral"ofbitsintheblockofdata.Ifthereisanoddnumberoferrors,thentheremustbeatleastonespiralthatcontainsanoddnumberoferrors,andtheparitybitforthatspiralwilldetecttheerror.No.ThechecksumwillfailtodetectanevennumberoferrorswhenboththeXORandRXORfunctionsfail.Inorderforbothtofail,thepatternoferrorbitsmustbeatintersectionpointsbetweenparityspiralsandparitycolumnssuchthatthereisanevennumberoferrorbitsineachparitycolumnandanevennumberoferrorbitsineachspiral.Itistoosimpletobeusedasasecurehashfunction;findingmultiplemessageswiththesamehashfunctionwouldbetooeasy.SupposeH(m)isacollisionresistanthashfunctionthatmapsamessageofarbitrarybitlengthintoan n-bithashvalue.Isittruethat,forallmessagesx,x'withx孜',wehaveHX)工H<')?Explainyouranswer.
Thestatementisfalse.Suchafunctioncannotbeone-to-onebecausethenumberofinputstothefunctionisofarbitrary,butthenumberofuniqueoutputsis2n.Thus,therearemultipleinputsthatmapintothesameoutput.PerformencryptionanddecryptionusingtheRSAalgorithm,asinFigture3.9,forthefollowing:p=3;q=11;e=7;M=5p=5;q=11;e=3;M=9p=7;q=11;e=17;M=8p=11;q=13;e=11;M=7p=17;q=31;e=7;M=2.Hint:Decryptionisnotashardasyouthink;usesomefinesse.n=33;(n)=20;d=3;C=26.n=55;(n)=40;d=27;C=14.n=77;(n)=60;d=53;C=57.n=143;(n)=120;d=11;C=106.n=527;(n)=480;d=343;C=128.Fordecryption,wehave128343mod527=1282561286412816128412821281mod527=352563510147128=2mod527=2mod257C=10M?C=10M?InanRSAsystem,thepublickeyofagivenuserise=31,n=3599.Whatistheprivatekeyofthisuser?d=3031SupposewehaveasetofblocksencodedwiththeRSAalgorithmandwedon'thavetheprivatekey,Assumen=pq,eisthepublickey.Supposealsosomeonetellsustheyknowoneoftheplaintextblockshasacommonfactorwithn.Doesthishelpusinanyway?Yes.Ifaplaintextblockhasacommonfactorwithnmodulonthentheencodedblockwillalsohaveacommonfactorwithnmodulon.Becauseweencodeblocksthataresmallerthanpq,thefactormustbeporqandtheplaintextblockmustbeamultipleofporq.Wecantesteachblockforprimality.Ifprime,itisporq.Inthiscasewedivideintontofindtheotherfactor.Ifnotprime,wefactoritandtrythefactorsasdivisorsofn.q=11andaConsideraDiffie-Hellmanschemewithacommonprimeprimitiveroot a=2.q=11andaIfuserAhaspublickeyYA=9,whatisA 'sprivatekeyXA?IfuserBhaspublickeyYB=3,whatisthesharedsecretkeyK?XA=6K=3Chapter4AuthenticationApplicationsANSWERSNSWERSTOQUESTIONSWhatproblemwasKerberosdesignedtoaddress?TheproblemthatKerberosaddressesisthis:Assumeanopendistributedenvironmentinwhichusersatworkstationswishtoaccessservicesonserversdistributedthroughoutthenetwork.Wewouldlikeforserverstobeabletorestrictaccesstoauthorizedusersandtobeabletoauthenticaterequestsforservice.Inthisenvironment,aworkstationcannotbetrustedtoidentifyitsuserscorrectlytonetworkservices.WhatarethreethreatsassociatedwithuserauthenticationoveranetworkorInternet?Ausermaygainaccesstoaparticularworkstationandpretendtobeanotheruseroperatingfromthatworkstation.2.Ausermayalterthenetworkaddressofaworkstationsothattherequestssentfromthealteredworkstationappeartocomefromtheimpersonatedworkstation.3.Ausermayeavesdroponexchangesanduseareplayattacktogainentrancetoaserverortodisruptoperations.Listthreeapproachestosecureuserauthenticationinadistributedenvironment.4.8WhatisthepurposeoftheX.509standard?4.8WhatisthepurposeoftheX.509standard?Relyoneachindividualclientworkstationtoassuretheidentityofitsuserorusersandrelyoneachservertoenforceasecuritypolicybasedonuseridentification(ID).2.Requirethatclientsystemsauthenticatethemselvestoservers,buttrusttheclientsystemconcerningtheidentityofitsuser.3.Requiretheusertoproveidentityforeachserviceinvoked.Alsorequirethatserversprovetheiridentitytoclients.WhatfourrequirementsaredefinedforKerberos?Secure:Anetworkeavesdroppershouldnotbeabletoobtainthenecessaryinformationtoimpersonateauser.Moregenerally,Kerberosshouldbestrongenoughthatapotentialopponentdoesnotfindittobetheweaklink.Reliable:ForallservicesthatrelyonKerberosforaccesscontrol,lackofavailabilityoftheKerberosservicemeanslackofavailabilityofthesupportedservices.Hence,Kerberosshouldbehighlyreliableandshouldemployadistributedserverarchitecture,withonesystemabletobackupanother.Transparent:Ideally,theusershouldnotbeawarethatauthenticationistakingplace,beyondtherequirementtoenterapassword.Scalable:Thesystemshouldbecapableofsupportinglargenumbersofclientsandservers.Thissuggestsamodular,distributedarchitecture.Whatentitiesconstituteafull-serviceKerberosenvironment?Afull-serviceKerberosenvironmentconsistsofaKerberosserver,anumberofclients,andanumberofapplicationservers.InthecontextofKerberos,whatisarealm?Arealmisanenvironmentinwhich:1.TheKerberosservermusthavetheuserID(UID)andhashedpasswordofallparticipatingusersinitsdatabase.AllusersareregisteredwiththeKerberosserver.2.TheKerberosservermustshareasecretkeywitheachserver.AllserversareregisteredwiththeKerberosserver.Whataretheprincipaldiffereneebetweenversion4andversion5ofKerberos?Version5overcomessomeenvironmentalshortcomingsandsometechnicaldeficienciesinVersion4.X.509definesaframeworkfortheprovisionofauthenticationservicesbytheX.500directorytoitsusers.Thedirectorymayserveasarepositoryofpublic-keycertificates.Eachcertificatecontainsthepublickeyofauserandissignedwiththeprivatekeyofatrustedcertificationauthority.Inaddition,X.509definesalternativeauthenticationprotocolsbasedontheuseofpublic-keycertificates.Whatisachainofcertificates?Achainofcertificatesconsistsofasequeneeofcertificatescreatedbydifferentcertificationauthorities(CAs)inwhicheachsuccessivecertificateisacertificatebyoneCAthatcertifiesthepublickeyofthenextCAinthechain.HowisanX.509certificaterevoked?Theownerofapublic-keycanissueacertificaterevocationlistthatrevokesoneormorecertificates.ANSWERSNSWERSTOPROBLEMSShowthatarandomerrorinblockofciphertextispropagatedtoallsubsequentblocksofplaintextinPCBCmode(Figure4.9).AnerrorinCiaffectsPibecausetheencryptionofCisXORedwithIVtoproducePi.BothC1andPiaffectP2,whichistheXORoftheencryptionofC2withtheXORofCiandPi.Beyondthat,PN-isoneoftheXORedinputstoformingFN.The1988versionofX.509listspropertiesthatPSAkeysmustsatisfytobesecure,givencurrentknowledgeaboutthedifficultyoffactoringlargenumbers.Thediscussionconcludeswithaconstraintonthepublicexponentandthemodulusn:Itmustbeensuredthate>log2(n)topreventattackbytakingtheethrootmodntodisclosetheplaintext.Althoughtheconstraintiscorrect,thereasongivenforrequiringitisincorrect.Whatiswrongwiththereasongivenandwhatisthecorrectreason?Takingtheethrootmodnofaciphertextblockwillalwaysrevealtheplaintext,nomatterwhatthevaluesofeandnare.Ingeneralthisisaverydifficultproblem,andindeedisthereasonwhyRSAissecure.Thepointisthat,ifeistoosmall,thentakingthenormalintegerethrootwillbethesameastakingtheethrootmodn,andtakingintegerethrootsisrelativelyeasy.Chapter5ElectronicMailSecurityANSWERSNSWERSTOQUESTIONSWhatarethefiveprincipalservicesprovidedbyPGP?Authentication,confidentiality,compression,e-mailcompatibility,andsegmentationWhatistheutilityofadetachedsignature?Adetachedsignatureisusefulinseveralcontexts.Ausermaywishtomaintainaseparatesignaturelogofallmessagessentorreceived.Adetachedsignatureofanexecutableprogramcandetectsubsequentvirusinfection.Finally,detachedsignaturescanbeusedwhenmorethanonepartymustsignadocument,suchasalegalcontract.Eachperson'ssignatureisindependentandthereforeisappliedonlytothedocument.Otherwise,signatureswouldhavetobenested,withthesecondsignersigningboththedocumentandthefirstsignature,andsoon.WhydoesPGPgenerateasignaturebeforeapplyingcompression?Itispreferabletosignanuncompressedmessagesothatonecanstoreonlytheuncompressedmessagetogetherwiththesignatureforfutureverification.Ifonesignedacompresseddocument,thenitwouldbenecessaryeithertostoreacompressedversionofthemessageforlaterverificationortorecompressthemessagewhenverificationisrequired.b.Evenifonewerewillingtogeneratedynamicallyarecompressedmessageforverification,PGP'scompressionalgorithmpresentsadifficulty.Thealgorithmisnotdeterministic;variousimplementationsofthealgorithmachievedifferenttradeoffsinrunningspeedversuscompressionratioand,asaresult,producedifferentcompressedforms.However,thesedifferentcompressionalgorithmsareinteroperablebecauseanyversionofthealgorithmcancorrectlydecompresstheoutputofanyotherversion.ApplyingthehashfunctionandsignatureaftercompressionwouldconstrainallPGPimplementationstothesameversionofthecompressionalgorithm.WhatisR64conversion?R64convertsaraw8-bitbinarystreamtoastreamofprintableASCIIcharacters.EachgroupofthreeoctetsofbinarydataismappedintofourASCIIcharacters.WhyisR64conversionusefulforane-mailapplication?WhenPGPisused,atleastpartoftheblocktobetransmittedisencrypted.Ifonlythesignatureserviceisused,thenthemessagedigestisencrypted(withthesender'sprivatekey).Iftheconfidentialityserviceisused,themessageplussignature(ifpresent)areencrypted(withaone-timesymmetrickey).Thus,partoralloftheresultingblockconsistsofastreamofarbitrary8-bitoctets.However,manyelectronicmailsystemsonlypermittheuseofblocksconsistingofASCIItext.WhyisthesegmentationandreassemblyfunctioninPGPneeded?E-mailfacilitiesoftenarerestrictedtoamaximummessagelength.HowdoesPGPusetheconceptoftrust?PGPincludesafacilityforassigningaleveloftrusttoindividualsignersandtokeys.WhatisRFC822?RFC822definesaformatfortextmessagesthataresentusingelectronicmail.WhatisMIME?MIMEisanextensiontotheRFC822frameworkthatisintendedtoaddresssomeoftheproblemsandlimitationsoftheuseofSMTP(SimpleMailTransferProtocol)orsomeothermailtransferprotocolandRFC822forelectronicmail.WhatisS/MIME?S/MIME(Secure/MultipurposeInternetMailExtension)isasecurityenhancementtotheMIMEInternete-mailformatstandard,basedontechnologyfromRSADataSecurity.ANSWERSNSWERSTOPROBLEMSInthePGPscheme,whatistheexpectednumberofsessionkeysgeneratedbeforeapreviouslycreatedkeyisproduced?ThisisjustanotherformofthebirthdayparadoxdiscussedinAppendix11A.Letusstatetheproblemasoneofdeterminingwhatnumberofsessionkeysmustbegeneratedsothattheprobabilityofaduplicateisgreaterthan0.5.FromEquation(11.6)inAppendix11A,wehavetheapproximation:k1.18nFora128-bitkey,thereare228possiblekeys.Thereforek1.1821281.18264Thefirst16bitsofthemessagedigestinaPGPsignaturearetranslatedintheclear.Towhatextentdoesthiscompromisethesecurityofthehashalgorithm?Towhatextentdoesitinfactperformitsintendedfunction,namely,tohelpdetermineifthecorrectRSAkeywasusedtodecryptthedigest?Notatall.Themessagedigestisencryptedwiththesender'sprivatekey.Therefore,anyoneinpossessionofthepublickeycandecryptitandrecovertheentiremessagedigest.Theprobabilitythatamessagedigestdecryptedwiththewrongkeywouldhaveanexactmatchinthefirst16bitswiththeoriginalmessagedigestis2 -6.InFigure5.4,eachentryinthepublic-keyringcontainsanownertrustfieldthatindicatesthedegreeoftrustassociatedwiththispublic-keyowner.Whyisthatnotenough?Thatis,ifthisowneristrustedandthisissupposedtobetheowner'spublickey,whyisnotthattrustenoughtopermitPGPtousethispublickey?Wetrustthisowner,butthatdoesnotnecessarilymeanthatwecantrustthatweareinpossessionofthatowner'spublickey.Considerradix-64conversionasaformofencryption.Inthiscase,thereisnokey.ButsupposethatanopponentknewonlythatsomeformofsubstitutionalgorithmwasbeingusedtoencryptEnglishtextanddidnotguessitwasR64.Howeffectivewouldthisalgorithmbeagainstcryptanalysis?Itcertainlyprovidesmoresecuritythanamonoalphabeticsubstitution.Becausewearetreatingtheplaintextasastringofbitsandencrypting6bitsatatime,wearenotencryptingindividualcharacters.Therefore,thefrequencyinformationislost,oratleastsignificantlyobscured.PhilZimmermannchoseIDEA,three-keytripleDES,andCAST-128assymmetricencryptionalgorithmsforPGP.Gi
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2026年生物基礎知識生物學科知識點題庫
- 2026年公務員行測練習題邏輯推理與言語理解
- 2026年公務員面試模擬公共危機應對與輿情管理
- 2026年人力資源招聘與面試技巧實操題庫
- 2026年公共交通從業(yè)者安全管理與服務禮儀考核題目
- 2026年文學鑒賞與批評能力測試題目庫
- 2026年人力資源管理專業(yè)考試全攻略
- 2026年公務員行政能力測試方向筆試題目
- 2026年環(huán)境工程治理技術(shù)規(guī)范試題庫
- 2026年金融投資知識培訓效果測試題集
- 寵物管理法律法規(guī)課件
- 韭菜的自我修養(yǎng)(李笑來)-2018
- 高一上學期期末考試英語試卷及答案兩套(附聽力錄音稿)
- 視覺傳播概論 課件全 任悅 第1-12章 視覺傳播的研究- 視覺傳播中的倫理與法規(guī)
- 溝通技巧與情商提升
- 2024屆新疆維吾爾自治區(qū)烏魯木齊市高三上學期第一次質(zhì)量監(jiān)測生物試題【含答案解析】
- 公司基層黨建問題清單
- 《廣西歷史建筑保護修繕及檢測技術(shù)標準》
- 福州港羅源灣港區(qū)碧里作業(yè)區(qū)4號泊位擴能改造工程環(huán)境影響報告
- 八年級物理下冊《滑輪》練習題及答案-人教版
- 江蘇省建設工程施工項目部關(guān)鍵崗位人員變更申請表優(yōu)質(zhì)資料
評論
0/150
提交評論