(英文版)网络安全技术习题集内容摘要:
ts a message with the recipient39。 s public key. Digital signature: The sender signs a message with its private key. Signing is achieved by a cryptographic algorithm applied to the message or to a small block of data that is a function of the message. Key exchange: Two sides cooperate to exchange a session key. Several different approaches are possible, involving the private key(s) of one or both parties. What is the difference between a private key and a secret key? The key used in conventional encryption is typically referred to as a secret key. The two keys used for publickey encryption are referred to as the public key and the private key. What is digital signature? A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature. The signature is formed by taking the hash of the message and encrypting the message with the creator39。 s private key. The signature guarantees the source and integrity of the message. 10 What is a publickey certificate? A pubickey certificate consists of a public key plus a User ID of the key owner, with the whole block signed by a trusted third party. Typically, the third party is a certificate authority (CA) that is trusted by the user munity, such as a government agency or a financial institution. How can publickey encryption be used to distribute a secret key? Several different approaches are possible, involving the private key(s) of one or both parties. One approach is DiffieHellman key exchange. Another approach is for the sender to encrypt a secret key with the recipient39。 s public key. ANSWERS NSWERS TO PROBLEMS Consider a 32bit hash function defined as the concatenation of two 16bit functions: XOR and RXOR, defined in Section as “two simple hash function.” a. Will this checksum detect all errors caused by an odd number of error bits? Explain. b. Will this checksum detect all errors caused by an even number of error bits? If not, characterize the error patterns that will cause the checksum to fail. c. Comments on the effectiveness of this function for use a hash functions for authentication. a. Yes. The XOR function is simply a vertical parity check. If there is an odd number of errors, then there must be at least one column that contains an odd number of errors, and the parity bit for that column will detect the error. Note that the RXOR function also catches all errors caused by an odd number of error bits. Each RXOR bit is a function of a unique spiral of bits in the block of data. If there is an odd number of errors, then there must be at least one spiral that contains an odd number of errors, and the parity bit for that spiral will detect the error. b. No. The checksum will fail to detect an even number of errors when both the XOR and RXOR functions fail. In order for both to fail, the pattern of error bits must be at intersection points between parity spirals and parity columns such that there is an even number of error bits in each parity column and an even 11 number of error bits in each spiral. c. It is too simple to be used as a secure hash function。 finding multiple messages with the same hash function would be too easy. Suppose H (m) is a collision resistant hash function that maps a message of arbitrary bit length into an nbit hash value. Is it true that, for all messages x, x’ with x≠x’,we have H(x)≠H(x’)?Explain your answer. The statement is false. Such a function cannot be onetoone because the number of inputs to the function is of arbitrary, but the number of unique outputs is 2n. Thus, there are multiple inputs that map into the same output. Perform encryption and decryption using the RSA algorithm, as in , for the following: a. p=3。 q=11。 e=7。 M=5 b. p=5。 q=11。 e=3。 M=9 c. p=7。 q=11。 e=17。 M=8 d. p=11。 q=13。 e=11。 M=7 e. p=17。 q=31。 e=7。 M=: Decryption is not as hard as you think。 use some finesse. a. n = 33。 (n) = 20。 d = 3。 C = 26. b. n = 55。 (n) = 40。 d = 27。 C = 14. c. n = 77。 (n) = 60。 d = 53。 C = 57. d. n = 143。 (n) = 120。 d = 11。 C = 106. e. n = 527。 (n) = 480。 d = 343。 C = 128. For decryption, we have 128343 mod 527 = 128256 12864 12816 1284 1282 1281 mod 527 = 35 256 35 101 47 128 = 2 mod 527 = 2 mod 257 In a publickey system using RSA, you intercept the cipher text C=10 sent to a user whose public key is e=5, n= is the plaintext M? M = 5 In an RSA system, the public key of a given user is e=31, n= is the private key of this user? d = 3031 Suppose we have a set of blocks encoded with the RSA algorithm and we don’t have the private key, Assume n=pq, e is the public key. 12 Suppose also someone tells us they know one of the plaintext blocks has a mon factor with n. Does this help us in any way? Yes. If a plaintext block has a mon factor with n modulo n then the encoded block will also have a mon factor with n modulo n. Because we encode blocks that are smaller than pq, the factor must be p or q and the plaintext block must be a multiple of p or q. We can test each block for primality. If prime, it is p or q. In this case we divide into n to find the other factor. If not prime, we factor it and try the factors as divisors of n. Consider a DiffieHellman scheme with a mon prime q=11 and a primitive root a=2. a. If user A has public key YA=9, what is A’s private key XA? b. If user B has public key YB=3, what is the shared secret key K? a. XA = 6 b. K = 3 13 Chapter 4 Authentication Applications ANSWERS NSWERS TO QUESTIONS What problem was Kerberos designed to address? The problem that Kerberos addresses is this: Assume an open distributed environment in which users at workstations wish to access services。(英文版)网络安全技术习题集
相关推荐
是涵盖公司管理,部门及分支机构管理,以及公司信息发布和信息共享交流的综合信息系统。 满足领导高效率处理日常事务的工作需要,提供邮件服务、会议组织、日程安排、公文发送、个人办公、议题 讨论、管理监督等功能,有效的协助领导顺利完成各项工作。 采用合理的工作流程方式处理影响工作效率的各个环节,最大限度地避免人工传送实物的工作。 提供自动监督工作功能,为部门之间实现真正的协同工作提供保证
调 整 、决算 预算调整方案由(政府财政部门)编制,经本级政府审定后,提请本级人大常委审批 中央预算调整方案 、决算草案 提请( 全国人大常委 )审批 县以上预算调整方案 、决算草案 提请( 本级人大常委 )审批 乡镇预算调整方案提请( 本级人大 )审批 六、决算 决算是指对年度( 预算收支 )执行结果的会计报告,是预算执行的总结,是国家管理预算活动的( 最后 )程序。 包括( 决算报表 )(
层重量不应小于 180g/㎡。 冷弯薄壁 型 钢采用的 连接 件应符合相关标准的规定。 用于 装配式轻型坡屋面 的承重木结构用材、木结构用胶及配件,应符合《木结构设计规范》 GB 50005 的规定。 新建屋面、平改坡屋面的屋面板宜采用定向 刨花 板(简称OSB 板 )、结构胶合板、普通木板及人造复合板等材料;采用波形瓦时,可不设屋面板。 木屋面板 材的 主要 性能
才能投入使用。 ( 4)实验室应建立合格供货单位和服务提供者的档案资料,对其质量保证能力予以印证。 ( 1)实验室是否制定了服务和供应品的选择、购买和验收、储存的相关管 理程序文件。 ( 2)实验室是否对服务和供应方进行了评价,是否建立了服务方 /供应方名单。 ( 3)实验室已发生的采购是否受控,是否正确选择具备资格的供应方。 ( 4)实验室是否规定了对采购品的验收要求,对供应品
列系数另见附表。 公司财务管理制度 第一章 总则 为加强公司的财务工作,发挥财务在公司经营管理和提高经济效益中的作用,特制定本规定。 第二章 现金管理 第一条: 公司财务收支严格执行“收支两条线”,不得坐支现金。 当天发生的经营收入当天必 须存入银行; 第二条: 财务人员从银行提取现金,应当填写《现金领用单》,并写明用途和金额,由总经理批准后提取; 第三条: 收款收据
单位进场后,我们首先对施工单位的 管理体系 开始进行审查,同时重点审查其管理人员及特殊工种作业人员的上岗 证件。 ( 2) 、 对原材料、构配件的质量控制 工程监理过程中 ,我 们 要求施工单位进场材料必须附产品出厂 合格证,质保书 并及时报我监理工程师进行进场材料的外观检验和质量证明文件审查,对按要求需做二次复试的原材料及时进行见证取样,并送法定检测单位检测。