网络安全技术英文习题集_网络安全技术 .pdf
![资源得分’ title=](/images/score_1.gif)
![资源得分’ title=](/images/score_1.gif)
![资源得分’ title=](/images/score_1.gif)
![资源得分’ title=](/images/score_1.gif)
![资源得分’ title=](/images/score_05.gif)
《网络安全技术英文习题集_网络安全技术 .pdf》由会员分享,可在线阅读,更多相关《网络安全技术英文习题集_网络安全技术 .pdf(36页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、网络安全技术英文习题集Chapter 1 IntroductionANSWERS NSWERS TO QUESTIONS 1.1 What is the OSI security architecture?The OSI Security Architecture is a framework that provides a systematic way of defining the requirements for security and characterizing the approaches to satisfying those requirements.The document
2、 defines security attacks,mechanisms,and services,and the relationships among these categories.1.2 What is the difference between passive and active security threats?Passive attacks have to do with eavesdropping on,or monitoring,transmissions.Electronic mail,file transfers,and client/server exchange
3、s are examples of transmissions that can be monitored.Active attacks include the modification of transmitted data and attempts to gain unauthorized access to computer systems.1.3 Lists and briefly define categories of passive and active security attacks?Passive attacks:release of message contents an
4、d traffic analysis.Active attacks:masquerade,replay,modification of messages,and denial of service.1.4 Lists and briefly define categories of security service?Authentication:The assurance that the communicating entity is the one that it claims to be.Access control:The prevention of unauthorized use
5、of a resource(i.e.,this service controls who can have access to a resource,under what conditions access can occur,and what those accessing the resource are allowed to do).Data confidentiality:The protection of data from unauthorized disclosure.Data integrity:The assurance that data received are exac
6、tly as sent by an authorized entity(i.e.,contain no modification,insertion,deletion,or replay).Nonrepudiation:Provides protection against denial by one of the entities involved in a communication of having participated in all or part of the communication.名师资料总结-精品资料欢迎下载-名师精心整理-第 1 页,共 36 页 -Availabi
7、lity service:The property of a system or a system resource being accessible and usable upon demand by an authorized system entity,according to performance specifications for the system(i.e.,a system is available if it provides services according to the system design whenever users request them).Chap
8、ter2 Symmetric Encryptionand Message ConfidentialityANSWERS NSWERS TO QUESTIONS2.1 What are the essential ingredients of a symmetric cipher?Plaintext,encryption algorithm,secret key,ciphertext,decryption algorithm.2.2 What are the two basic functions used in encryption algorithms?Permutation and sub
9、stitution.2.3 How many keys are required for two people to communicate via a symmetric cipher?One secret key.2.4 What is the difference between a block cipher and a stream cipher?A stream cipher is one that encrypts a digital data stream one bit or one byte at a time.A block cipher is one in which a
10、 block of plaintext is treated as a whole and used to produce a ciphertext block of equal length.2.5 What are the two general approaches to attacking a cipher?Cryptanalysis and brute force.2.6 Why do some block cipher modes of operation only use encryption while others use both encryption and decryp
11、tion?In some modes,the plaintext does not pass through the encryption function,but is XORed with the output of the encryption function.The math works out that for decryption in these cases,the encryption function must also be used.2.7 What is triple encryption?名师资料总结-精品资料欢迎下载-名师精心整理-第 2 页,共 36 页 -Wi
12、th triple encryption,a plaintext block is encrypted by passing it through an encryption algorithm;the result is then passed through the same encryption algorithm again;the result of the second encryption is passed through the same encryption algorithm a third time.Typically,the second stage uses the
13、 decryption algorithm rather than the encryption algorithm.2.8 Why is the middle portion of 3DES a decryption rather than an encryption?There is no cryptographic significance to the use of decryption for the second stage.Its only advantage is that it allows users of 3DES to decrypt data encrypted by
14、 users of the older single DES by repeating the key.2.9 What is the difference between link and end-to-end encryption?With link encryption,each vulnerable communications link is equipped on both ends with an encryption device.With end-to-end encryption,the encryption process is carried out at the tw
15、o end systems.The source host or terminal encrypts the data;the data in encrypted form are then transmitted unaltered across the network to the destination terminal or host.2.10 List ways in which secret keys can be distributed to two communicating parties.For two parties A and B,key distribution ca
16、n be achieved in a number of ways,as follows:(1)A can select a key and physically deliver it to B.(2)A third party can select the key and physically deliver it to A and B.(3)If A and B have previously and recently used a key,one party can transmit the new key to the other,encrypted using the old key
17、.(4)If A and B each has an encrypted connection to a third party C,C can deliver a key on the encrypted links to A and B.2.11 What is the difference between a session key and a master key?A session key is a temporary encryption key used between two principals.A master key is a long-lasting key that
18、is used between a key distribution center and a principal for the purpose of encoding the transmission of session keys.Typically,the master keys are distributed by noncryptographic means.2.12 What is a key distribution center?名师资料总结-精品资料欢迎下载-名师精心整理-第 3 页,共 36 页 -A key distribution center is a system
19、 that is authorized to transmit temporary session keys to principals.Each session key is transmitted in encrypted form,using a master key that the key distribution center shares with the target principal.ANSWERS NSWERS TO PROBLEMS 2.1 What RC4 key value will leave S unchanged during initialization?T
20、hat is,after the initial permutation of S,the entries of S will be equal to the values from 0 through 255 in ascending order.Use a key of length 255 bytes.The first two bytes are zero;that is K0=K1=0.Thereafter,we have:K2=255;K3=254;K255=2.2.2 If a bit error occurs in the transmission of a ciphertex
21、t character in 8-bit CFB mode,how far does the error propagate?Nine plaintext characters are affected.The plaintext character corresponding to the ciphertext character is obviously altered.In addition,the altered ciphertext character enters the shift register and is not removed until the next eight
22、characters are processed.2.3 Key distribution schemes using an access control center and/or a key distribution center have central points vulnerable to attack.Discuss the security implications of such centralization.The central points should be highly fault-tolerant,should be physically secured,and
23、should use trusted hardware/software.Chapter 3 Public-Key Cryptography and Message AuthenticationANSWERS NSWERS TO QUESTIONS3.1 List three approaches to message authentication.Message encryption,message authentication code,hash function.3.2 What is message authentication code?名师资料总结-精品资料欢迎下载-名师精心整理-
24、第 4 页,共 36 页 -An authenticator that is a cryptographic function of both the data to be authenticated and a secret key.3.3 Briefly describe the three schemes illustrated in Figture3.2.(a)A hash code is computed from the source message,encrypted using symmetric encryption and a secret key,and appended
25、 to the message.At the receiver,the same hash code is computed.The incoming code is decrypted using the same key and compared with the computed hash code.(b)This is the same procedure as in(a)except that public-key encryption is used;the sender encrypts the hash code with the senders private key,and
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 网络安全技术英文习题集_网络安全技术 2022 网络安全 技术 英文 习题集
![提示](https://www.taowenge.com/images/bang_tan.gif)
限制150内