网络安全技术英文习题集-网络安全技术.doc
《网络安全技术英文习题集-网络安全技术.doc》由会员分享,可在线阅读,更多相关《网络安全技术英文习题集-网络安全技术.doc(32页珍藏版)》请在咨信网上搜索。
《网络安全技术》英文习题集 Chapter 1 Introduction ANSWERS NSWERS TO QUESTIONS 1。1 What is the OSI security architecture? The OSI Security Architecture is a framework that provides a systematic way of defining the requirements for security and characterizing the approaches to satisfying those requirements。 The document defines security attacks, mechanisms, and services, and the relationships among these categories。 1.2 What is the difference between passive and active security threats? Passive attacks have to do with eavesdropping on, or monitoring, transmissions. Electronic mail, file transfers, and client/server exchanges are examples of transmissions that can be monitored。 Active attacks include the modification of transmitted data and attempts to gain unauthorized access to computer systems。 1。3 Lists and briefly define categories of passive and active security attacks? Passive attacks: release of message contents and traffic analysis。 Active attacks: masquerade, replay, modification of messages, and denial of service. 1.4 Lists and briefly define categories of security service? Authentication: The assurance that the communicating entity is the one that it claims to be。 Access control: The prevention of unauthorized use of a resource (i。e., this service controls who can have access to a resource, under what conditions access can occur, and what those accessing the resource are allowed to do). Data confidentiality: The protection of data from unauthorized disclosure. Data integrity: The assurance that data received are exactly as sent by an authorized entity (i。e。, contain no modification, insertion, deletion, or replay). Nonrepudiation: Provides protection against denial by one of the entities involved in a communication of having participated in all or part of the communication。 Availability service: The property of a system or a system resource being accessible and usable upon demand by an authorized system entity, according to performance specifications for the system (i。e。, a system is available if it provides services according to the system design whenever users request them). Chapter2 Symmetric Encryptionand Message Confidentiality ANSWERS NSWERS TO QUESTIONS 2.1 What are the essential ingredients of a symmetric cipher? Plaintext, encryption algorithm, secret key, ciphertext, decryption algorithm。 2.2 What are the two basic functions used in encryption algorithms? Permutation and substitution. 2.3 How many keys are required for two people to communicate via a symmetric cipher? One secret key。 2。4 What is the difference between a block cipher and a stream cipher? A stream cipher is one that encrypts a digital data stream one bit or one byte at a time。 A block cipher is one in which a block of plaintext is treated as a whole and used to produce a ciphertext block of equal length. 2。5 What are the two general approaches to attacking a cipher? Cryptanalysis and brute force. 2.6 Why do some block cipher modes of operation only use encryption while others use both encryption and decryption? In some modes, the plaintext does not pass through the encryption function, but is XORed with the output of the encryption function. The math works out that for decryption in these cases, the encryption function must also be used。 2.7 What is triple encryption? With triple encryption, a plaintext block is encrypted by passing it through an encryption algorithm; the result is then passed through the same encryption algorithm again; the result of the second encryption is passed through the same encryption algorithm a third time。 Typically, the second stage uses the decryption algorithm rather than the encryption algorithm。 2.8 Why is the middle portion of 3DES a decryption rather than an encryption? There is no cryptographic significance to the use of decryption for the second stage。 Its only advantage is that it allows users of 3DES to decrypt data encrypted by users of the older single DES by repeating the key。 2。9 What is the difference between link and end—to—end encryption? With link encryption, each vulnerable communications link is equipped on both ends with an encryption device。 With end—to-end encryption, the encryption process is carried out at the two end systems. The source host or terminal encrypts the data; the data in encrypted form are then transmitted unaltered across the network to the destination terminal or host。 2.10 List ways in which secret keys can be distributed to two communicating parties. For two parties A and B, key distribution can be achieved in a number of ways, as follows: (1)A can select a key and physically deliver it to B。 (2)A third party can select the key and physically deliver it to A and B. (3)If A and B have previously and recently used a key, one party can transmit the new key to the other, encrypted using the old key。 (4)If A and B each has an encrypted connection to a third party C, C can deliver a key on the encrypted links to A and B. 2。11 What is the difference between a session key and a master key? A session key is a temporary encryption key used between two principals。 A master key is a long—lasting key that is used between a key distribution center and a principal for the purpose of encoding the transmission of session keys。 Typically, the master keys are distributed by noncryptographic means。 2.12 What is a key distribution center? A key distribution center is a system that is authorized to transmit temporary session keys to principals。 Each session key is transmitted in encrypted form, using a master key that the key distribution center shares with the target principal。 ANSWERS NSWERS TO PROBLEMS 2。1 What RC4 key value will leave S unchanged during initialization? That is, after the initial permutation of S, the entries of S will be equal to the values from 0 through 255 in ascending order。 Use a key of length 255 bytes. The first two bytes are zero; that is K[0] = K[1] = 0. Thereafter, we have: K[2] = 255; K[3] = 254; … K[255]= 2. 2.2 If a bit error occurs in the transmission of a ciphertext character in 8-bit CFB mode, how far does the error propagate? Nine plaintext characters are affected。 The plaintext character corresponding to the ciphertext character is obviously altered. In addition, the altered ciphertext character enters the shift register and is not removed until the next eight characters are processed. 2.3 Key distribution schemes using an access control center and/or a key distribution center have central points vulnerable to attack。 Discuss the security implications of such centralization。 The central points should be highly fault-tolerant, should be physically secured, and should use trusted hardware/software. Chapter 3 Public—Key Cryptography and Message Authentication ANSWERS NSWERS TO QUESTIONS 3.1 List three approaches to message authentication. Message encryption, message authentication code, hash function。 3。2 What is message authentication code? An authenticator that is a cryptographic function of both the data to be authenticated and a secret key。 3.3 Briefly describe the three schemes illustrated in Figture3.2. (a) A hash code is computed from the source message, encrypted using symmetric encryption and a secret key, and appended to the message。 At the receiver, the same hash code is computed。 The incoming code is decrypted using the same key and compared with the computed hash code。 (b) This is the same procedure as in (a) except that public—key encryption is used; the sender encrypts the hash code with the sender’s private key, and the receiver decrypts the hash code with the sender's public key. (c) A secret value is appended to a message and then a hash code is calculated using the message plus secret value as input。 Then the message (without the secret value) and the hash code are transmitted. The receiver appends the same secret value to the message and computes the hash value over the message plus secret value。 This is then compared to the received hash code. 3。4 What properties must a hash function have to be useful for message authentication? (1)H can be applied to a block of data of any size. (2)H produces a fixed—length output。 (3)H(x) is relatively easy to compute for any given x, making both hardware and software implementations practical。 (4)For any given value h, it is computationally infeasible to find x such that H(x) = h. This is sometimes referred to in the literature as the one-way property. (5)For any given block x, it is computationally infeasible to find y ≠ x with H(y) =H(x)。 (6)It is computationally infeasible to find any pair (x, y) such that H(x) = H(y). 3。5 In the context of a hash function, what is a compression function? The compression function is the fundamental module, or basic building block, of a hash function. The hash function consists of iterated application of the compression function。 3.6 What are the principal ingredients of a public-key cryptosystem? Plaintext: This is the readable message or data that is fed into the algorithm as input。 Encryption algorithm: The encryption algorithm performs various transformations on the plaintext. Public and private keys: This is a pair of keys that have been selected so that if one is used for encryption, the other is used for decryption。 The exact transformations performed by the encryption algorithm depend on the public or private key that is provided as input。 Ciphertext: This is the scrambled message produced as output. It depends on the plaintext and the key。 For a given message, two different keys will produce two different ciphertexts. Decryption algorithm: This algorithm accepts the ciphertext and the matching key and produces the original plaintext. 3。7 List and briefly define three uses of a public-key cryptosystem。 Encryption/decryption: The sender encrypts a message with the recipient's public key. Digital signature: The sender "signs” a message with its private key. Signing is achieved by a cryptographic algorithm applied to the message or to a small block of data that is a function of the message. Key exchange: Two sides cooperate to exchange a session key. Several different approaches are possible, involving the private key(s) of one or both parties。 3。8 What is the difference between a private key and a secret key? The key used in conventional encryption is typically referred to as a secret key. The two keys used for public—key encryption are referred to as the public key and the private key. 3.9 What is digital signature? A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature。 The signature is formed by taking the hash of the message and encrypting the message with the creator’s private key。 The signature guarantees the source and integrity of the message. 3.10 What is a public—key certificate? A pubic—key certificate consists of a public key plus a User ID of the key owner, with the whole block signed by a trusted third party。 Typically, the third party is a certificate authority (CA) that is trusted by the user community, such as a government agency or a financial institution. 3。11 How can public-key encryption be used to distribute a secret key? Several different approaches are possible, involving the private key(s) of one or both parties. One approach is Diffie—Hellman key exchange. Another approach is for the sender to encrypt a secret key with the recipient’s public key. ANSWERS NSWERS TO PROBLEMS 3。1 Consider a 32—bit hash function defined as the concatenation of two 16—bit functions: XOR and RXOR, defined in Section 3.2 as “two simple hash function。" a。 Will this checksum detect all errors caused by an odd number of error bits? Explain. b。 Will this checksum detect all errors caused by an even number of error bits? If not, characterize the error patterns that will cause the checksum to fail。 c. Comments on the effectiveness of this function for use a hash functions for authentication。 a. Yes. The XOR function is simply a vertical parity check. If there is an odd number of errors, then there must be at least one column that contains an odd number of errors, and the parity bit for that column will detect the error. Note that the RXOR function also catches all errors caused by an odd number of error bits. Each RXOR bit is a function of a unique "spiral” of bits in the block of data. If there is an odd number of errors, then there must be at least one spiral that contains an odd number of errors, and the parity bit for that spiral will detect the error. b. No。 The checksum will fail to detect an even number of errors when both the XOR and RXOR functions fail. In order for both to fail, the pattern of error bits must be at intersection points between parity spirals and parity columns such that there is an even number of error bits in each parity column and an even number of error bits in each spiral。 c. It is too simple to be used as a secure hash function; finding multiple messages with the same hash function would be too easy。 3.2 Suppose H (m) is a collision resistant hash function that maps a message of arbitrary bit length into an n-bit hash value. Is it true that, for all messages x, x’ with x≠x’,we have H(x)≠H(x’)?Explain your answer。 The statement is false. Such a function cannot be one-to—one because the number of inputs to the function is of arbitrary, but the number of unique outputs is 2n. Thus, there are multiple inputs that map into the same output。 3.3 Perform encryption and decryption using the RSA algorithm, as in Figture3。9, for the following: a。 p=3;q=11;e=7;M=5 b。 p=5;q=11;e=3;M=9 c。 p=7;q=11;e=17;M=8 d. p=11;q=13;e=11;M=7 e. p=17;q=31;e=7;M=2。Hint: Decryption is not as hard as you think; use some finesse. a。 n = 33; ö(n) = 20; d = 3; C = 26。 b. n = 55; ö(n) = 40; d = 27; C = 14。 c. n = 77; ö(n) = 60; d = 53; C = 57. d。 n = 143; ö(n) = 120; d = 11; C = 106. e。 n = 527; ö(n) = 480; d = 343; C = 128。 For decryption, we have 128343 mod 527 = 128256 × 12864 × 12816 × 1284 × 1282 × 1281 mod 527 = 35 × 256 × 35 × 101 × 47 × 128 = 2 mod 527 = 2 mod 257 3.4 In a public-key system using RSA, you intercept the cipher text C=10 sent to a user whose public key is e=5, n=35.What is the plaintext M? M = 5 3。5 In an RSA system, the public key of a given user is e=31, n=3599。What is the private key of this user? d = 3031 3.6 Suppose we have a set of blocks encoded with the RSA algorithm and we don’t have the private key, Assume n=pq, e is the public key。 Suppose also someone tells us they know one of the plaintext blocks has a common factor with n。 Does this help us in any way? Yes. If a plaintext block has a common factor with n modulo n then the encoded block will also have a common factor with n modulo n。 Because we encode blocks that are smaller than pq, the factor must be p or q and the plaintext block must be a multiple of p or q. We can test each block for pr- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 网络安全 技术 英文 习题集
咨信网温馨提示:
1、咨信平台为文档C2C交易模式,即用户上传的文档直接被用户下载,收益归上传人(含作者)所有;本站仅是提供信息存储空间和展示预览,仅对用户上传内容的表现方式做保护处理,对上载内容不做任何修改或编辑。所展示的作品文档包括内容和图片全部来源于网络用户和作者上传投稿,我们不确定上传用户享有完全著作权,根据《信息网络传播权保护条例》,如果侵犯了您的版权、权益或隐私,请联系我们,核实后会尽快下架及时删除,并可随时和客服了解处理情况,尊重保护知识产权我们共同努力。
2、文档的总页数、文档格式和文档大小以系统显示为准(内容中显示的页数不一定正确),网站客服只以系统显示的页数、文件格式、文档大小作为仲裁依据,个别因单元格分列造成显示页码不一将协商解决,平台无法对文档的真实性、完整性、权威性、准确性、专业性及其观点立场做任何保证或承诺,下载前须认真查看,确认无误后再购买,务必慎重购买;若有违法违纪将进行移交司法处理,若涉侵权平台将进行基本处罚并下架。
3、本站所有内容均由用户上传,付费前请自行鉴别,如您付费,意味着您已接受本站规则且自行承担风险,本站不进行额外附加服务,虚拟产品一经售出概不退款(未进行购买下载可退充值款),文档一经付费(服务费)、不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
4、如你看到网页展示的文档有www.zixin.com.cn水印,是因预览和防盗链等技术需要对页面进行转换压缩成图而已,我们并不对上传的文档进行任何编辑或修改,文档下载后都不会有水印标识(原文档上传前个别存留的除外),下载后原文更清晰;试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓;PPT和DOC文档可被视为“模板”,允许上传人保留章节、目录结构的情况下删减部份的内容;PDF文档不管是原文档转换或图片扫描而得,本站不作要求视为允许,下载前自行私信或留言给上传者【人****来】。
5、本文档所展示的图片、画像、字体、音乐的版权可能需版权方额外授权,请谨慎使用;网站提供的党政主题相关内容(国旗、国徽、党徽--等)目的在于配合国家政策宣传,仅限个人学习分享使用,禁止用于任何广告和商用目的。
6、文档遇到问题,请及时私信或留言给本站上传会员【人****来】,需本站解决可联系【 微信客服】、【 QQ客服】,若有其他问题请点击或扫码反馈【 服务填表】;文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“【 版权申诉】”(推荐),意见反馈和侵权处理邮箱:1219186828@qq.com;也可以拔打客服电话:4008-655-100;投诉/维权电话:4009-655-100。
1、咨信平台为文档C2C交易模式,即用户上传的文档直接被用户下载,收益归上传人(含作者)所有;本站仅是提供信息存储空间和展示预览,仅对用户上传内容的表现方式做保护处理,对上载内容不做任何修改或编辑。所展示的作品文档包括内容和图片全部来源于网络用户和作者上传投稿,我们不确定上传用户享有完全著作权,根据《信息网络传播权保护条例》,如果侵犯了您的版权、权益或隐私,请联系我们,核实后会尽快下架及时删除,并可随时和客服了解处理情况,尊重保护知识产权我们共同努力。
2、文档的总页数、文档格式和文档大小以系统显示为准(内容中显示的页数不一定正确),网站客服只以系统显示的页数、文件格式、文档大小作为仲裁依据,个别因单元格分列造成显示页码不一将协商解决,平台无法对文档的真实性、完整性、权威性、准确性、专业性及其观点立场做任何保证或承诺,下载前须认真查看,确认无误后再购买,务必慎重购买;若有违法违纪将进行移交司法处理,若涉侵权平台将进行基本处罚并下架。
3、本站所有内容均由用户上传,付费前请自行鉴别,如您付费,意味着您已接受本站规则且自行承担风险,本站不进行额外附加服务,虚拟产品一经售出概不退款(未进行购买下载可退充值款),文档一经付费(服务费)、不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
4、如你看到网页展示的文档有www.zixin.com.cn水印,是因预览和防盗链等技术需要对页面进行转换压缩成图而已,我们并不对上传的文档进行任何编辑或修改,文档下载后都不会有水印标识(原文档上传前个别存留的除外),下载后原文更清晰;试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓;PPT和DOC文档可被视为“模板”,允许上传人保留章节、目录结构的情况下删减部份的内容;PDF文档不管是原文档转换或图片扫描而得,本站不作要求视为允许,下载前自行私信或留言给上传者【人****来】。
5、本文档所展示的图片、画像、字体、音乐的版权可能需版权方额外授权,请谨慎使用;网站提供的党政主题相关内容(国旗、国徽、党徽--等)目的在于配合国家政策宣传,仅限个人学习分享使用,禁止用于任何广告和商用目的。
6、文档遇到问题,请及时私信或留言给本站上传会员【人****来】,需本站解决可联系【 微信客服】、【 QQ客服】,若有其他问题请点击或扫码反馈【 服务填表】;文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“【 版权申诉】”(推荐),意见反馈和侵权处理邮箱:1219186828@qq.com;也可以拔打客服电话:4008-655-100;投诉/维权电话:4009-655-100。
关于本文