信息安全答案_第1页
信息安全答案_第2页
信息安全答案_第3页
全文预览已结束

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

Whatisthebasiccomponentsofcomputersecurity?Trytogivetheconnotationofeachiteminyourlist.Answer:Confidentiality:Keepingdataandresourceshidden;Integrity:referstothetrustworthinessofdataorresources,anditisusuallyphrasedintermsofpreventingimproperorunauthorizedchange.Integrityincludesdataintegrityandoriginintegrity.Availability:Enablingaccesstodataandresources.Whataresecuritypolicyandsecuritymechanism?Answer:Policysayswhatis,andisnot,allowed.Thisdefines"security"forthesite/system/etc.policiesoftenrequiresomeproceduralmechanismsthattechnologycannotenforceMechanismsisamethod,tool,orprocedureforenforcingasecuritypolicy.Mechanismscanbenontechnical,suchasrequiringproofofidentitybeforechangingapasswordWhatarethedifferencesbetweenMACandDAC?Answer:答案在.txt文档中。Consideracomputersystemwiththreeusers:Alice,Bob,andCyndy.Aliceownsthefilealicerc,andBobandCyndycanreadit.CyndycanreadandwriterBob'sfilebobrc,butAlicecanonlyreadit.OnlyCyndycanreadandwriteherfileCyndyrc.Assumethattheownerofeachofthesefilescanexcuteit.Createthecorrespondingaccesscontrolmatrix.CyndygivesAlicepermissiontoreadCyndyrc,andAliceremovesBob'sabilitytoreadalicerc.Showthenewaccesscontrolmatrix.Answer:Thesimplestframeworkfordescribingaprotectionsystemistheaccesscontrolmatrixmodel,whichdescribestherightsofusersoverfilesinamatrix.alicercbobrccyndyrcAliceBobCyndyAliceoxrrwxoBobroxrwxoCyndyrrworwxrwxo⑵alicercbobrccyndyrcAliceBobCyndyAliceoxrrrwxoBoboxrwxoCyndyrrworwxrwxoC汜sarcipher&Vigen辻eCipher&DES.Answer:TheC缶sarcipheristhewidelyknowncipherinwhichlettersareshifted.Forexample,ifthekeyis3,theletterAbecomesD,BbecomesE,andsoforth,endingwithZbecomingC.Sotheword"HELLO"isencipheredas"KHOOR."Vigen^reCipher:Alongerkeymightobscurethestatistics.TheVigenerecipherchoosesasequenceofkeys,representedbyastring.Thekeylettersareappliedtosuccessiveplaintextcharacters,andwhentheendofthekeyisreached,thekeystartsover.Thelengthofthekeyiscalledtheperiodofthecipher.DES加密算法见文档。

Explainwhatareconfidentiality,integrityandavailabilityincomputersecurity.(10points)Answer:Confidentiality:confidentialityistheconcealmentofinformationorresources.Accesscontrolmechanismssupportconfidentiality.confidentialityalsoappliestotheexistenceofdata,whichissometimesmorerevealingthanthedataitself.Resourcehidingisanotherimportantaspectofconfidentiality.Allthemechanismsthatenforceconfidentialityrequiresupportingservicesfromthesystem.Integrity:Integrityreferstothetrustworthinessofdataorresources,anditisusuallyphrasedintermsofpreventingimproperorunauthorizedchange.Integrityincludesdataintegrityandoriginintegrity.Integritymechanismsfallintotwoclasses:preventionmechanismsanddetectionmechanisms.Availability:Availabilityreferstotheabilitytousetheinformationorresourcedesired.Availabilityisanimportantaspectofreliabilityaswellasofsystemdesignbecauseanunavailablesystemisatleastasbadasnosystematall.Whataredefinitionsofobjectandsubject?(lesson2)Answer:Thesetofallprotectedentities(thatis,entitiesthatarerelevanttotheprotectionstateofthesystem)iscalledthesetofobjectsO.ThesetofsubjectsSisthesetofactiveobjects,suchasprocessesandusers.信息系统中的所有实体都可以分为主体和客体。所谓主体,就是系统中具有主动性的实体,如用户、进程等,它们可以主动发起操作。所谓客体,则是被动的、作为操作对象的实体,如文件、存储设备等,我们可以把它们看做存储信息内容的容器。Answer:10.6数字签名必须与所签文件捆绑在一起。数字签名是通过验证算法来验证。好的数字签名算法应该使伪造签名十分困难。数字签名是一个二进制串,容易复制。所以必须防止数字签名重复使用。数字签名必须保证以下几点:接收者能够核实发送者对报文的签名;发送者事后不能抵赖对报文的签名;接收者不能伪造对报文的签名。First,supposethatAlicewantstotrickBobintosigningamessagem.Shecomputestwoothermessagesm1andm2suchthatm1m2modnBob=m.ShehasBobsignm1andm2.AlicethenmultipliesthetwosignaturestogetherandreducesmodnBob,andshehasBob'ssignatureonm.(SeeExercise8.)Thedefenseisnottosignrandomdocumentsand,whensigning,neversignthedocumentitself;signacryptographichashofthedocument.SupposeAliceissendingBobhersignatureonaconfidentialcontractm.Sheenciphersitfirst,thensignsit:抑EH粘耐andsendstheresulttoBob.However,BobwantstoclaimthatAlicesenthimthecontractM.BobcomputesanumberrsuchthatMrmodnBob=m.Hethenrepublisheshispublickeyas(reBob,nBob).Notethatthemodulusdoesnotchange.Now,heclaimsthatAlicesenthimM.Thejudgeverifiesthisusinghiscurrentpublickey.Thesimplestwaytofixthisistorequirealluserstousethesameexponentbutvarythemoduli.(先用哈希函数对明文进行压缩,再把明文用私钥加密,把加密的和之前的明文传给别人,然后别人再把加密的用公钥解密,把明文哈希压缩一下,最后比较这两者之间的hash值是否相等,若等,则为真实签名,否则是伪造的)ListthebasicrequirementsofCryptographicChecksumfunction.(9-4)Acryptographicchecksumfunction(alsocalledastronghashfunctionorastrongone-wayfunction)h:A一>Bisafunctionthathasthefollowingproperties.ForanyxGA,h(x)iseasytocompute.ForanyyGB,itiscomputationallyinfeasibletofindxGAsuchthath(x)=y.Itiscomputationallyinfeasibletofindx,x'GA,suchthatxHx'andh(x)=h(x').(Suchapairiscalledacollision.)Thethirdrequirementisoftenstatedas:GivenanyxGA,itiscomputationallyinfeasibletofindanotherx'GAsuchthatxGx'andh(x')=h(x).lO.Whatarethedifferencesbetweentheclassicalkeycryptographyandthepublickeycryptography?Answer:Classicalcryptosystems(alsocalledsingle-keyorsymmetriccryptosystems)arecryptosystemsthatusethesamekeyforenciphermentanddecipherment.Inthesesystems,forallEkGCandkGK,thereisaDkGDsuchthatDkk k k=Ek-1・Thepublickeycryptography:Oneofthekeyswouldbepubliclyknown;theotherwouldbekeptprivatebyitsowner.Classicalcryptographyrequiresthesenderandrecipienttoshareacommonkey.Publickeycryptographydoesnot.Iftheenciphermentkeyispublic,tosendasecretmessagesimplyencipherthemessagewiththerecipient'spublickey.Thensendit.Therecipientcandecipheritusinghisprivatekey.Becauseonekeyispublic,anditscomplementarykeymustremainsecret,apublickeycryp

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

最新文档

评论

0/150

提交评论