版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
《网络安全技术》英文习题集Chapter1IntroductionANSWERSNSWERSTOQUESTIONSWhatistheOSIsecurityarchitecture?TheOSISecurityArchitectureisaframeworkthatprovidesasystematicwayofdefiningtherequirementsforsecurityandcharacterizingtheapproachestosatisfyingthoserequirements.Thedocumentdefinessecurityattacks,mechanisms,andservices,andtherelationshipsamongthesecategories.Whatisthediffereneebetweenpassiveandactivesecuritythreats?Passiveattackshavetodowitheavesdroppingon,ormonitoring,transmissions.Electronicmail,filetransfers,andclient/serverexchangesareexamplesoftransmissionsthatcanbemonitored.Activeattacksincludethemodificationoftransmitteddataandattemptstogainunauthorizedaccesstocomputersystems.Listsandbrieflydefinecategoriesofpassiveandactivesecurityattacks?Passiveattacks:releaseofmessagecontentsandtrafficanalysis.Activeattacks:masquerade,replay,modificationofmessages,anddenialofservice.Listsandbrieflydefinecategoriesofsecurityservice?Authentication :Theassuraneethatthecommunicatingentityistheonethatitclaimstobe.Accesscontrol:Thepreventionofunauthorizeduseofaresource(i.e.,thisservicecontrolswhocanhaveaccesstoaresource,underwhatconditionsaccesscanoccur,andwhatthoseaccessingtheresourceareallowedtodo).Dataconfidentiality:Theprotectionofdatafromunauthorizeddisclosure.Dataintegrity:Theassuraneethatdatareceivedareexactlyassentbyanauthorizedentity(i.e.,containnomodification,insertion,deletion,orreplay).Nonrepudiation:ProvidesprotectionagainstdenialbyoneoftheentitiesinvoIvedinacommunicationofhavingparticipatedinallorpartofthecommunication.2.12Whatisakeydistributioncenter?2.12Whatisakeydistributioncenter?2.7Whatistripleencryption?2.7Whatistripleencryption?Availabilityservice:Thepropertyofasystemorasystemresourcebeingaccessibleandusableupondemandbyanauthorizedsystementity,accordingtoperformaneespecificationsforthesystem(i.e.,asystemisavailableifitprovidesservicesaccordingtothesystemdesignwheneverusersrequestthem).Chapter2SymmetricEncryptionandMessageConfidentialityANSWERSNSWERSTOQUESTIONSWhataretheessentialingredientsofasymmetriccipher?Plaintext,encryptionalgorithm,secretkey,ciphertext,decryptionalgorithm.Whatarethetwobasicfunctionsusedinencryptionalgorithms?Permutationandsubstitution.Howmanykeysarerequiredfortwopeopletocommunicateviaasymmetriccipher?Onesecretkey.Whatisthediffereneebetweenablockcipherandastreamcipher?Astreamcipherisonethatencryptsadigitaldatastreamonebitoronebyteatatime.Ablockcipherisoneinwhichablockofplaintextistreatedasawholeandusedtoproduceaciphertextblockofequallength.Whatarethetwogeneralapproachestoattackingacipher?Cryptanalysisandbruteforce.Whydosomeblockciphermodesofoperationonlyuseencryptionwhileothersusebothencryptionanddecryption?Insomemodes,theplaintextdoesnotpassthroughtheencryptionfunction,butisXORedwiththeoutputoftheencryptionfunction.Themathworksoutthatfordecryptioninthesecases,theencryptionfunctionmustalsobeused.Withtripleencryption,aplaintextblockisencryptedbypassingitthroughanencryptionalgorithm;theresultisthenpassedthroughthesameencryptionalgorithmagain;theresultofthesecondencryptionispassedthroughthesameencryptionalgorithmathirdtime.Typically,thesecondstageusesthedecryptionalgorithmratherthantheencryptionalgorithm.Whyisthemiddleportionof3DESadecryptionratherthananencryption?Thereisnocryptographicsignificaneetotheuseofdecryptionforthesecondstage.Itsonlyadvantageisthatitallowsusersof3DEStodecryptdataencryptedbyusersoftheoldersingleDESbyrepeatingthekey.Whatisthediffereneebetweenlinkandend-to-endencryption?Withlinkencryption,eachvulnerablecommunicationslinkisequippedonbothendswithanencryptiondevice.Withend-to-endencryption,theencryptionprocessiscarriedoutatthetwoendsystems.Thesourcehostorterminalencryptsthedata;thedatainencryptedformarethentransmittedunalteredacrossthenetworktothedestinationterminalorhost.Listwaysinwhichsecretkeyscanbedistributedtotwocommunicatingparties.FortwopartiesAandB,keydistributioncanbeachievedinanumberofways,asfollows:AcanselectakeyandphysicallydeliverittoB.AthirdpartycanselectthekeyandphysicallydeliverittoAandB.lfAandBhavepreviouslyandrecentlyusedakey,onepartycantransmitthenewkeytotheother,encryptedusingtheoldkey.IfAandBeachhasanencryptedconnectiontoathirdpartyC,CcandeliverakeyontheencryptedlinkstoAandB.Whatisthediffereneebetweenasessionkeyandamasterkey?Asessionkeyisatemporaryencryptionkeyusedbetweentwoprincipals.AmasterkeyisaIong-lastingkeythatisusedbetweenakeydistributioncenterandaprincipalforthepurposeofencodingthetransmissionofsessionkeys.Typically,themasterkeysaredistributedbynoncryptographicmeans.3.2Whatismessageauthenticationcode?3.2Whatismessageauthenticationcode?Akeydistributioncenterisasystemthatisauthorizedtotransmittemporarysessionkeystoprincipals.Eachsessionkeyistransmittedinencryptedform,usingamasterkeythatthekeydistributioncentershareswiththetargetprincipal.ANSWERSNSWERSTOPROBLEMSWhatRC4keyvaluewillleaveSunchangedduringinitialization?Thatis,aftertheinitialpermutationofS,theentriesofSwillbeequaltothevaluesfrom0through255inascendingorder.Useakeyoflength255bytes.Thefirsttwobytesarezero;thatisK[0]=K[1]=0.Thereafter,wehave:K[2]=255;K[3]=254; …K[255]=2.Ifabiterroroccursinthetransmissionofaciphertextcharacterin8-bitCFBmode,howfardoestheerrorpropagate?Nineplaintextcharactersareaffected.Theplaintextcharactercorrespondingtotheciphertextcharacterisobviouslyaltered.Inaddition,thealteredciphertextcharacterenterstheshiftregisterandisnotremoveduntilthenexteightcharactersareprocessed.Keydistributionschemesusinganaccesscontrolcenterand/orakeydistributioncenterhavecentralpointsvulnerabletoattack.Discussthesecurityimplicationsofsuchcentralization.Thecentralpointsshouldbehighlyfault-tolerant,shouldbephysicallysecured,andshouldusetrustedhardware/software.Chapter3Public-Key CryptographyandMessageAuthenticationANSWERSNSWERSTOQUESTIONSListthreeapproachestomessageauthentication.Messageencryption,messageauthenticationcode,hashfunction.Anauthenticatorthatisacryptographicfunctionofboththedatatobeauthenticatedandasecretkey.BrieflydescribethethreeschemesillustratedinFigture3.2.(a)Ahashcodeiscomputedfromthesourcemessage,encryptedusingsymmetricencryptionandasecretkey,andappendedtothemessage.Atthereceiver,thesamehashcodeiscomputed.Theincomingcodeisdecryptedusingthesamekeyandcomparedwiththecomputedhashcode.(b)Thisisthesameprocedureasin(a)exceptthatpublic-keyencryptionisused;thesenderencryptsthehashcodewiththesender'sprivatekey,andthereceiverdecryptsthehashcodewiththesender'spublickey.(c)Asecretvalueisappendedtoamessageandthenahashcodeiscalculatedusingthemessageplussecretvalueasinput.Thenthemessage(withoutthesecretvalue)andthehashcodearetransmitted.Thereceiverappendsthesamesecretvaluetothemessageandcomputesthehashvalueoverthemessageplussecretvalue.Thisisthencomparedtothereceivedhashcode.Whatpropertiesmustahashfunctionhavetobeusefulformessageauthentication?Hcanbeappliedtoablockofdataofanysize.Hproducesafixed-lengthoutput.H(x)isrelativelyeasytocomputeforanygivenx,makingbothhardwareandsoftwareimplementationspractical.Foranygivenvalueh,itiscomputationallyinfeasibletofindxsuchthatH(x)=h.Thisissometimesreferredtointheliteratureastheone-wayproperty.Foranygivenblockx,itiscomputationallyinfeasibletofindy工xwithH(y)=H(x).Itiscomputationallyinfeasibletofindanypair(x,y)suchthatH(x)=H(y).Inthecontextofahashfunction,whatisacompressionfunction?Thecompressionfunctionisthefundamentalmodule,orbasicbuildingblock,ofahashfunction.Thehashfunctionconsistsofiteratedapplicationofthecompressionfunction.Whataretheprincipalingredientsofapublic-keycryptosystem?Plaintext:Thisisthereadablemessageordatathatisfedintothealgorithmasinput.Encryptionalgorithm:Theencryptionalgorithmperformsvarioustransformationsontheplaintext.Publicandprivatekeys:Thisisapairofkeysthathavebeenselectedsothatifoneisusedforencryption,theotherisusedfordecryption.Theexacttransformationsperformedbytheencryptionalgorithmdependonthepublicorprivatekeythatisprovidedasinput.Ciphertext:Thisisthescrambledmessageproducedasoutput.Itdependsontheplaintextandthekey.Foragivenmessage,twodifferentkeyswillproducetwodifferentciphertexts.Decryptionalgorithm:Thisalgorithmacceptstheciphertextandthematchingkeyandproducestheoriginalplaintext.Listandbrieflydefinethreeusesofapublic-keycryptosystem.Encryption/decryption:Thesenderencryptsamessagewiththerecipient'spublickey.Digitalsignature:Thesender"signs"amessagewithitsprivatekey.Signingisachievedbyacryptographicalgorithmappliedtothemessageortoasmallblockofdatathatisafunctionofthemessage.Keyexchange:Twosidescooperatetoexchangeasessionkey.Severaldifferentapproachesarepossible,involvingtheprivatekey(s)ofoneorbothparties.3.8Whatisthediffereneebetweenaprivatekeyandasecretkey?Thekeyusedinconventionalencryptionistypicallyreferredtoasasecretkey.Thetwokeysusedforpublic-keyencryptionarereferredtoasthepublickeyandtheprivatekey.3.9Whatisdigitalsignature?Adigitalsignatureisanauthenticationmechanismthatenablesthecreatorofamessagetoattachacodethatactsasasignature.Thesignatureisformedbytakingthehashofthemessageandencryptingthemessagewiththecreator'sprivatekey.Thesignatureguaranteesthesourceandintegrityofthemessage.Whatisapublic-keycertificate?Apubic-keycertificateconsistsofapublickeyplusaUserIDofthekeyowner,withthewholeblocksignedbyatrustedthirdparty.Typically,thethirdpartyisacertificateauthority(CA)thatistrustedbytheusercommunity,suchasagovernmentagencyorafinancialinstitution.Howcanpublic-keyencryptionbeusedtodistributeasecretkey?Severaldifferentapproachesarepossible,involvingtheprivatekey(s)ofoneorbothparties.OneapproachisDiffie-Hellmankeyexchange.Anotherapproachisforthesendertoencryptasecretkeywiththerecipient'spublickey.ANSWERSNSWERSTOPROBLEMSConsidera32-bithashfunctiondefinedastheconcatenationoftwo16-bitfunctions:XORandRXOR,definedinSection3.2as “twosimpiehashfunction.”Willthischecksumdetectallerrorscausedbyanoddnumberoferrorbits?Explain.Willthischecksumdetectallerrorscausedbyanevennumberoferrorbits?Ifnot,characterizetheerrorpatternsthatwillcausethechecksumtofail.Commentsontheeffectivenessofthisfunctionforuseahashfunctionsforauthentication.Yes.TheXORfunctionissimplyaverticalparitycheck.Ifthereisanoddnumberoferrors,thentheremustbeatleastonecolumnthatcontainsanoddnumberoferrors,andtheparitybitforthatcolumnwilldetecttheerror.NotethattheRXORfunctionalsocatchesallerrorscausedbyanoddnumberoferrorbits.EachRXORbitisafunctionofaunique"spiral"ofbitsintheblockofdata.Ifthereisanoddnumberoferrors,thentheremustbeatleastonespiralthatcontainsanoddnumberoferrors,andtheparitybitforthatspiralwilldetecttheerror.No.ThechecksumwillfailtodetectanevennumberoferrorswhenboththeXORandRXORfunctionsfail.Inorderforbothtofail,thepatternoferrorbitsmustbeatintersectionpointsbetweenparityspiralsandparitycolumnssuchthatthereisanevennumberoferrorbitsineachparitycolumnandanevennumberoferrorbitsineachspiral.Itistoosimpletobeusedasasecurehashfunction;findingmultiplemessageswiththesamehashfunctionwouldbetooeasy.SupposeH(m)isacollisionresistanthashfunctionthatmapsamessageofarbitrarybitlengthintoan n-bithashvalue.Isittruethat,forallmessagesx,x'withx孜',wehaveHX)工H<')?Explainyouranswer.
Thestatementisfalse.Suchafunctioncannotbeone-to-onebecausethenumberofinputstothefunctionisofarbitrary,butthenumberofuniqueoutputsis2n.Thus,therearemultipleinputsthatmapintothesameoutput.PerformencryptionanddecryptionusingtheRSAalgorithm,asinFigture3.9,forthefollowing:p=3;q=11;e=7;M=5p=5;q=11;e=3;M=9p=7;q=11;e=17;M=8p=11;q=13;e=11;M=7p=17;q=31;e=7;M=2.Hint:Decryptionisnotashardasyouthink;usesomefinesse.n=33;(n)=20;d=3;C=26.n=55;(n)=40;d=27;C=14.n=77;(n)=60;d=53;C=57.n=143;(n)=120;d=11;C=106.n=527;(n)=480;d=343;C=128.Fordecryption,wehave128343mod527=1282561286412816128412821281mod527=352563510147128=2mod527=2mod257C=10M?C=10M?InanRSAsystem,thepublickeyofagivenuserise=31,n=3599.Whatistheprivatekeyofthisuser?d=3031SupposewehaveasetofblocksencodedwiththeRSAalgorithmandwedon'thavetheprivatekey,Assumen=pq,eisthepublickey.Supposealsosomeonetellsustheyknowoneoftheplaintextblockshasacommonfactorwithn.Doesthishelpusinanyway?Yes.Ifaplaintextblockhasacommonfactorwithnmodulonthentheencodedblockwillalsohaveacommonfactorwithnmodulon.Becauseweencodeblocksthataresmallerthanpq,thefactormustbeporqandtheplaintextblockmustbeamultipleofporq.Wecantesteachblockforprimality.Ifprime,itisporq.Inthiscasewedivideintontofindtheotherfactor.Ifnotprime,wefactoritandtrythefactorsasdivisorsofn.q=11andaConsideraDiffie-Hellmanschemewithacommonprimeprimitiveroot a=2.q=11andaIfuserAhaspublickeyYA=9,whatisA 'sprivatekeyXA?IfuserBhaspublickeyYB=3,whatisthesharedsecretkeyK?XA=6K=3Chapter4AuthenticationApplicationsANSWERSNSWERSTOQUESTIONSWhatproblemwasKerberosdesignedtoaddress?TheproblemthatKerberosaddressesisthis:Assumeanopendistributedenvironmentinwhichusersatworkstationswishtoaccessservicesonserversdistributedthroughoutthenetwork.Wewouldlikeforserverstobeabletorestrictaccesstoauthorizedusersandtobeabletoauthenticaterequestsforservice.Inthisenvironment,aworkstationcannotbetrustedtoidentifyitsuserscorrectlytonetworkservices.WhatarethreethreatsassociatedwithuserauthenticationoveranetworkorInternet?Ausermaygainaccesstoaparticularworkstationandpretendtobeanotheruseroperatingfromthatworkstation.2.Ausermayalterthenetworkaddressofaworkstationsothattherequestssentfromthealteredworkstationappeartocomefromtheimpersonatedworkstation.3.Ausermayeavesdroponexchangesanduseareplayattacktogainentrancetoaserverortodisruptoperations.Listthreeapproachestosecureuserauthenticationinadistributedenvironment.4.8WhatisthepurposeoftheX.509standard?4.8WhatisthepurposeoftheX.509standard?Relyoneachindividualclientworkstationtoassuretheidentityofitsuserorusersandrelyoneachservertoenforceasecuritypolicybasedonuseridentification(ID).2.Requirethatclientsystemsauthenticatethemselvestoservers,buttrusttheclientsystemconcerningtheidentityofitsuser.3.Requiretheusertoproveidentityforeachserviceinvoked.Alsorequirethatserversprovetheiridentitytoclients.WhatfourrequirementsaredefinedforKerberos?Secure:Anetworkeavesdroppershouldnotbeabletoobtainthenecessaryinformationtoimpersonateauser.Moregenerally,Kerberosshouldbestrongenoughthatapotentialopponentdoesnotfindittobetheweaklink.Reliable:ForallservicesthatrelyonKerberosforaccesscontrol,lackofavailabilityoftheKerberosservicemeanslackofavailabilityofthesupportedservices.Hence,Kerberosshouldbehighlyreliableandshouldemployadistributedserverarchitecture,withonesystemabletobackupanother.Transparent:Ideally,theusershouldnotbeawarethatauthenticationistakingplace,beyondtherequirementtoenterapassword.Scalable:Thesystemshouldbecapableofsupportinglargenumbersofclientsandservers.Thissuggestsamodular,distributedarchitecture.Whatentitiesconstituteafull-serviceKerberosenvironment?Afull-serviceKerberosenvironmentconsistsofaKerberosserver,anumberofclients,andanumberofapplicationservers.InthecontextofKerberos,whatisarealm?Arealmisanenvironmentinwhich:1.TheKerberosservermusthavetheuserID(UID)andhashedpasswordofallparticipatingusersinitsdatabase.AllusersareregisteredwiththeKerberosserver.2.TheKerberosservermustshareasecretkeywitheachserver.AllserversareregisteredwiththeKerberosserver.Whataretheprincipaldiffereneebetweenversion4andversion5ofKerberos?Version5overcomessomeenvironmentalshortcomingsandsometechnicaldeficienciesinVersion4.X.509definesaframeworkfortheprovisionofauthenticationservicesbytheX.500directorytoitsusers.Thedirectorymayserveasarepositoryofpublic-keycertificates.Eachcertificatecontainsthepublickeyofauserandissignedwiththeprivatekeyofatrustedcertificationauthority.Inaddition,X.509definesalternativeauthenticationprotocolsbasedontheuseofpublic-keycertificates.Whatisachainofcertificates?Achainofcertificatesconsistsofasequeneeofcertificatescreatedbydifferentcertificationauthorities(CAs)inwhicheachsuccessivecertificateisacertificatebyoneCAthatcertifiesthepublickeyofthenextCAinthechain.HowisanX.509certificaterevoked?Theownerofapublic-keycanissueacertificaterevocationlistthatrevokesoneormorecertificates.ANSWERSNSWERSTOPROBLEMSShowthatarandomerrorinblockofciphertextispropagatedtoallsubsequentblocksofplaintextinPCBCmode(Figure4.9).AnerrorinCiaffectsPibecausetheencryptionofCisXORedwithIVtoproducePi.BothC1andPiaffectP2,whichistheXORoftheencryptionofC2withtheXORofCiandPi.Beyondthat,PN-isoneoftheXORedinputstoformingFN.The1988versionofX.509listspropertiesthatPSAkeysmustsatisfytobesecure,givencurrentknowledgeaboutthedifficultyoffactoringlargenumbers.Thediscussionconcludeswithaconstraintonthepublicexponentandthemodulusn:Itmustbeensuredthate>log2(n)topreventattackbytakingtheethrootmodntodisclosetheplaintext.Althoughtheconstraintiscorrect,thereasongivenforrequiringitisincorrect.Whatiswrongwiththereasongivenandwhatisthecorrectreason?Takingtheethrootmodnofaciphertextblockwillalwaysrevealtheplaintext,nomatterwhatthevaluesofeandnare.Ingeneralthisisaverydifficultproblem,andindeedisthereasonwhyRSAissecure.Thepointisthat,ifeistoosmall,thentakingthenormalintegerethrootwillbethesameastakingtheethrootmodn,andtakingintegerethrootsisrelativelyeasy.Chapter5ElectronicMailSecurityANSWERSNSWERSTOQUESTIONSWhatarethefiveprincipalservicesprovidedbyPGP?Authentication,confidentiality,compression,e-mailcompatibility,andsegmentationWhatistheutilityofadetachedsignature?Adetachedsignatureisusefulinseveralcontexts.Ausermaywishtomaintainaseparatesignaturelogofallmessagessentorreceived.Adetachedsignatureofanexecutableprogramcandetectsubsequentvirusinfection.Finally,detachedsignaturescanbeusedwhenmorethanonepartymustsignadocument,suchasalegalcontract.Eachperson'ssignatureisindependentandthereforeisappliedonlytothedocument.Otherwise,signatureswouldhavetobenested,withthesecondsignersigningboththedocumentandthefirstsignature,andsoon.WhydoesPGPgenerateasignaturebeforeapplyingcompression?Itispreferabletosignanuncompressedmessagesothatonecanstoreonlytheuncompressedmessagetogetherwiththesignatureforfutureverification.Ifonesignedacompresseddocument,thenitwouldbenecessaryeithertostoreacompressedversionofthemessageforlaterverificationortorecompressthemessagewhenverificationisrequired.b.Evenifonewerewillingtogeneratedynamicallyarecompressedmessageforverification,PGP'scompressionalgorithmpresentsadifficulty.Thealgorithmisnotdeterministic;variousimplementationsofthealgorithmachievedifferenttradeoffsinrunningspeedversuscompressionratioand,asaresult,producedifferentcompressedforms.However,thesedifferentcompressionalgorithmsareinteroperablebecauseanyversionofthealgorithmcancorrectlydecompresstheoutputofanyotherversion.ApplyingthehashfunctionandsignatureaftercompressionwouldconstrainallPGPimplementationstothesameversionofthecompressionalgorithm.WhatisR64conversion?R64convertsaraw8-bitbinarystreamtoastreamofprintableASCIIcharacters.EachgroupofthreeoctetsofbinarydataismappedintofourASCIIcharacters.WhyisR64conversionusefulforane-mailapplication?WhenPGPisused,atleastpartoftheblocktobetransmittedisencrypted.Ifonlythesignatureserviceisused,thenthemessagedigestisencrypted(withthesender'sprivatekey).Iftheconfidentialityserviceisused,themessageplussignature(ifpresent)areencrypted(withaone-timesymmetrickey).Thus,partoralloftheresultingblockconsistsofastreamofarbitrary8-bitoctets.However,manyelectronicmailsystemsonlypermittheuseofblocksconsistingofASCIItext.WhyisthesegmentationandreassemblyfunctioninPGPneeded?E-mailfacilitiesoftenarerestrictedtoamaximummessagelength.HowdoesPGPusetheconceptoftrust?PGPincludesafacilityforassigningaleveloftrusttoindividualsignersandtokeys.WhatisRFC822?RFC822definesaformatfortextmessagesthataresentusingelectronicmail.WhatisMIME?MIMEisanextensiontotheRFC822frameworkthatisintendedtoaddresssomeoftheproblemsandlimitationsoftheuseofSMTP(SimpleMailTransferProtocol)orsomeothermailtransferprotocolandRFC822forelectronicmail.WhatisS/MIME?S/MIME(Secure/MultipurposeInternetMailExtension)isasecurityenhancementtotheMIMEInternete-mailformatstandard,basedontechnologyfromRSADataSecurity.ANSWERSNSWERSTOPROBLEMSInthePGPscheme,whatistheexpectednumberofsessionkeysgeneratedbeforeapreviouslycreatedkeyisproduced?ThisisjustanotherformofthebirthdayparadoxdiscussedinAppendix11A.Letusstatetheproblemasoneofdeterminingwhatnumberofsessionkeysmustbegeneratedsothattheprobabilityofaduplicateisgreaterthan0.5.FromEquation(11.6)inAppendix11A,wehavetheapproximation:k1.18nFora128-bitkey,thereare228possiblekeys.Thereforek1.1821281.18264Thefirst16bitsofthemessagedigestinaPGPsignaturearetranslatedintheclear.Towhatextentdoesthiscompromisethesecurityofthehashalgorithm?Towhatextentdoesitinfactperformitsintendedfunction,namely,tohelpdetermineifthecorrectRSAkeywasusedtodecryptthedigest?Notatall.Themessagedigestisencryptedwiththesender'sprivatekey.Therefore,anyoneinpossessionofthepublickeycandecryptitandrecovertheentiremessagedigest.Theprobabilitythatamessagedigestdecryptedwiththewrongkeywouldhaveanexactmatchinthefirst16bitswiththeoriginalmessagedigestis2 -6.InFigure5.4,eachentryinthepublic-keyringcontainsanownertrustfieldthatindicatesthedegreeoftrustassociatedwiththispublic-keyowner.Whyisthatnotenough?Thatis,ifthisowneristrustedandthisissupposedtobetheowner'spublickey,whyisnotthattrustenoughtopermitPGPtousethispublickey?Wetrustthisowner,butthatdoesnotnecessarilymeanthatwecantrustthatweareinpossessionofthatowner'spublickey.Considerradix-64conversionasaformofencryption.Inthiscase,thereisnokey.ButsupposethatanopponentknewonlythatsomeformofsubstitutionalgorithmwasbeingusedtoencryptEnglishtextanddidnotguessitwasR64.Howeffectivewouldthisalgorithmbeagainstcryptanalysis?Itcertainlyprovidesmoresecuritythanamonoalphabeticsubstitution.Becausewearetreatingtheplaintextasastringofbitsandencrypting6bitsatatime,wearenotencryptingindividualcharacters.Therefore,thefrequencyinformationislost,oratleastsignificantlyobscured.PhilZimmermannchoseIDEA,three-keytripleDES,andCAST-128assymmetricencryptionalgorithmsforPGP.Gi
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2024年浙科版选修6地理下册月考试卷含答案
- 2024年浙科版选修2化学上册月考试卷
- 创业公司的融资策略与实战
- 医疗环境优化结合操场绿化的健康理念
- 2024年物业委托合同范本:绿色社区物业委托管理创新协议3篇
- 2024年度车辆租赁与智能交通系统接入合同3篇
- 2025中国铁建大桥工程局集团建筑工程公司招聘高频重点提升(共500题)附带答案详解
- 2025中国远洋海运集团内部招聘中远海运(上海)限公司招聘2人信息高频重点提升(共500题)附带答案详解
- 2025中国石油工业出版社高校毕业生招聘11人高频重点提升(共500题)附带答案详解
- 可可粉行业相关投资计划提议
- 2024年河南省中职对口升学高考语文试题真题(解析版)
- 《食品行业ERP应用》课件
- 2023-2024学年广东省广州市黄埔区六年级(上)期末数学试卷(A卷)
- 41-降低悬挑式卸料平台安全隐患发生率 枣庄华厦(4:3定稿)
- 2024年北京市学业水平合格性地理试卷(第一次)
- 黑龙江哈尔滨六中2025届高三第六次模拟考试数学试卷含解析
- 2023年不动产登记代理人《不动产登记法律制度政策》考前通关必练题库(含答案)
- GB/T 36547-2024电化学储能电站接入电网技术规定
- 售后服务人员培训资料课件
- 禁止随地乱扔垃圾
- 期末 (试题) -2024-2025学年人教PEP版(2024)英语三年级上册
评论
0/150
提交评论