2022年密码编码学与网络安全第四版第二章答案翻译.docx
《2022年密码编码学与网络安全第四版第二章答案翻译.docx》由会员分享,可在线阅读,更多相关《2022年密码编码学与网络安全第四版第二章答案翻译.docx(12页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、精选学习资料 - - - - - - - - - 其次章2.1 什么是对称密码的本质成分?Plaintext, encryption algorithm, secret key, ciphertext, decryption algorithm. 明文 加密算法密钥 密文解密算法2.2 密码算法中两个基本函数式什么?Permutation and substitution. 代换和置换 P20 2.3 用密码进行通信的两个人需要多少密钥?对称密码只需要一把,非对称密码要两把 P20 2.4 分组密码和流密码的区分是什么?A stream cipher is one that encrypts
2、a digital data stream one bit or one byte at a time. A block cipher is one in which a block of plaintext is treated as a whole and used to produce a ciphertext block of equal length. 分组密码每次输入的一组元素,相应地输出一组元素;流密码就是连续地处理输入元素,每次输出一个元素;P20 2.5 攻击密码的两种一般方法是什么?Cryptanalysis and brute force. 密码分析和暴力破解2.6 列出
3、并简要定力基于攻击者所知道信息的密码分析攻击类型;Ciphertext only . One possible attack under these circumstances is the brute-force approach of trying all possible keys. If the key space is very large, this becomes impractical. Thus, the opponent must rely on an analysis of the ciphertext itself, generally applying various
4、 statistical tests to it. Known plaintext. The analyst may be able to capture one or more plaintext messages as well as their encryptions. With this knowledge, the analyst may be able to deduce the key on the basis of the way in which the known plaintext is transformed. Chosen plaintext. If the anal
5、yst is able to choose the messages to encrypt, the analyst may deliberately pick patterns that can be expected to reveal the structure of the key.名师归纳总结 - - - - - - -第 1 页,共 9 页精选学习资料 - - - - - - - - - 惟密文已知明文挑选明文2.7 无条件安全密码和运算上安全密码的区分是什么?An encryption scheme is unconditionally secure if the ciphert
6、ext generated by the scheme does not contain enough information to determine uniquely the corresponding plaintext, no matter how much ciphertext is available. An encryption scheme is said to be computationally secure if: 1 the cost of breaking the cipher exceeds the value of the encrypted informatio
7、n, and 2 the time required to break the cipher exceeds the useful lifetime of the information. 书本 P21 2.8 简要定义 Caesar密码 The Caesar cipher involves replacing each letter of the alphabet with the letter standing k places further down the alphabet, for k in the range 1 through 25. 书本 P22 2.9 简要定义单表代换密码
8、 A monoalphabetic substitution cipher maps a plaintext alphabet to a ciphertext alphabet, so that each letter of the plaintext alphabet maps to a single unique letter of the ciphertext alphabet. 书本 P23 2.10 简要定义 Playfair 密码 The Playfair algorithm is based on the use of a 5 5 matrix of letters constr
9、ucted using a keyword. Plaintext is encrypted two letters at a time using this matrix. 书本 P26 2.11 单表代换密码和夺标代换密码的区分是什么?A polyalphabetic substitution cipher uses a separate monoalphabetic substitution cipher for each successive letter of plaintext, depending on a key. 书本 P30 名师归纳总结 - - - - - - -第 2 页
10、,共 9 页精选学习资料 - - - - - - - - - 2.12 一次一密的两个问题是什么?1. There is the practical problem of making large quantities of random keys. Any heavily used system might require millions of random characters on a regular basis. Supplying truly random characters in this volume is a significant task. 2. Even more d
11、aunting is the problem of key distribution and protection. For every message to be sent, a key of equal length is needed by both sender and receiver. Thus, a mammoth key distribution problem exists. 书本 P33 2.13 什么是置换密码?A transposition cipher involves a permutation of the plaintext letters. 书本 P33 2.
12、14 什么是隐写术?Steganography involves concealing the existence of a message. 书本 P36 2.7.3 习题 2.1 a.对 b 的取值是否有限制?说明缘由;没有限制, b 只会使得明文加密后的密文字母统一左移或右移,因此假如是单射的,b 转变后依旧是单射;注:答案解答得很坑爹,答了等于没答;现解答如下: aq0mod 26如要E k pE k q,就apbaqbmod26 不成立,就ap不成立;这时b 已经消掉了,因此明显b 不会影响算法的映射特性;b.判定 a 不能取哪些值;2, 4, 6, 8, 10, 12, 13, 1
13、4, 16, 18, 20, 22, 24. 当 a 大于 25 时, a 也不能是使得 a mod 26 为 这些数的值;c.分析 a 可以取那些值,不行以取那些值;并给出理由;名师归纳总结 a 与 26 必需没有大于1 的公因子;也就是说a 与 26 互素,或者最大公约数为1.为了说第 3 页,共 9 页- - - - - - -精选学习资料 - - - - - - - - - 明为什么是这样, 先留意到要使Ea, p = Ea, q 0 p q 1.就当 q = p + m/k p 时, p q= -m/k,明显 26 能整除 ap q,从而 Ea, p = Ea, q. 注:由 a .
14、 知 a p q 0mod 26 不成立,就 26 不能整除 a p q . 由文中示意 0 p 26,0 q 26,这个其实开头我也不知道,后来觉得应当是这样;由于 与 不相等,所以 p q 26,因此 p q 不行能是 26 的整数倍,但是 p q 有可能是 或 13 的整数倍;因此 a 不能是 或 13 的整数倍;2.2 有多少种仿射 Caesar 密码?a 有 12 种可能的值( 2, 4, 6, 8, 10, 12, 13, 14, 16, 18, 20, 22, 24 ),b 有 26 种可能的值( 0到 25),因此总共有12 26 = 312 种仿射 Caesar密码;B,次高
15、的字母为U,请破译2.3 用仿射 Caesar 密码加密得到一份密文;频率最高的字母为该密码;假设明文中频率最高的字母为e,次高的字母为t;留意 e=4(e 排在第 4,a 排在第 0,没有第 26),B=1,t=19,U=20;因此可以得到:1 = 4a + b mod 26 20 = 19a + b mod 26 名师归纳总结 下式减上式可得19 = 15a mod 26,通过反复的错误试验,可得a = 3 第 4 页,共 9 页然后代入第一条式子可得1 = 12 + b mod 26 ,然后得出b = 15 - - - - - - -精选学习资料 - - - - - - - - - 留意
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 2022 密码 编码 网络安全 第四 第二 答案 翻译
限制150内