没有合适的资源?快使用搜索试试~ 我知道了~
密码学11-23.pdf


试读
66页
需积分: 0 0 下载量 130 浏览量
更新于2024-12-27
收藏 5.99MB PDF 举报
密码学是一门研究信息安全的学科,它涉及一系列用于保护数据的方法和协议。《密码学与网络安全:原理与实践 第八版》是由William Stallings所著的一本权威教材,涵盖了密码学和网络安全领域的基本概念、技术和应用。此教材的解决方案手册为教师和学生提供了一个宝贵的资源,包含对教科书中复习问题和家庭作业问题的详尽解答。本手册强调了对内容的保护,任何复制和分发都必须获得出版商或作者的书面许可。此外,如果读者在解决方案中发现错误,可以通过电子邮件通知作者,教材也提供了一个错误表的链接,以便于读者及时反馈并获取更新信息。
在密码学的范畴内,该教材详细介绍了密码散列函数(Chapter 11),这些函数是一种从任意长度的数据中产生固定长度输出的算法,常用于确保数据完整性。消息认证码(Chapter 12)用于验证信息在传输过程中未被篡改,它结合了密钥和消息来生成认证码。数字签名(Chapter 13)是一个数字信息的加密签名,用于验证消息的完整性和源的认证。轻量级密码学和量子密码学(Chapter 14)关注在资源受限的设备上如何实现安全以及如何设计能够抵御量子计算机攻击的加密技术。密钥管理和分发(Chapter 15)涉及密钥的生成、存储、分配和更新过程。用户身份认证(Chapter 16)是网络安全中确保只有授权用户才能访问系统资源的过程。
密码学的原理和实践对于学习和维护网络安全至关重要。通过对这些基础知识的深入理解和应用,可以为保护个人和组织的信息安全提供坚实基础。《密码学与网络安全:原理与实践 第八版》及其解决方案手册为密码学的学习者提供了详实的资料,帮助他们更好地掌握密码学和网络安全的关键概念和技术。

SOLUTIONS
MANUAL
C
RYPTOGRAPHY AND
N
ETWORK
S
ECURITY
:
P
RINCIPLES AND
P
RACTICE
E
IGHTH
E
DITION
C
HAPTERS
11–23
W
ILLIAM
S
TALLINGS
Copyright 2019: William Stallings
© 2020 Pearson Education, Inc., Hoboken, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher.

-2-
© 2019 by William Stallings
All rights reserved. No part
of this document may be
reproduced, in any form or
by any means, or posted on
the Internet, without
permission in writing from
the author. Selected
solutions may be shared
with students, provided
that they are not available,
unsecured, on the Web.
© 2020 Pearson Education, Inc., Hoboken, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher.

-3-
NOTICE
This manual contains solutions to the review
questions and homework problems in
Cryptography and Network Security, Eighth
Edition. If you spot an error in a solution or in
the wording of a problem, I would greatly
appreciate it if you would forward the
information via email to wllmst@me.net. An
errata sheet for this manual, if needed, is
available at
https://www.box.com/shared/nh8hti5167 File
name is S-Crypto8e-mmyy.
W.S.
Chapter 11 Cryptographic Hash Functions .................................... 5
Chapter 12 Message Authentication Codes ................................. 14
Chapter 13 Digital Signatures ................................................... 20
Chapter 14 Lightweight Cryptography and Post-Quantum
Cryptography .......................................................................... 24
Chapter 15 Key Management and Distribution ............................ 26
Chapter 16 User Authentication ................................................ 33
Chapter 17 Transport-Level Security .......................................... 37
Chapter 18 Wireless Network Security ....................................... 40
Chapter 19 Electronic Mail Security............................................ 44
Chapter 20 IP Security ............................................................. 48
Chapter 21 Network Endpoint Security ....................................... 55
TABLE OF CONTENTS
© 2020 Pearson Education, Inc., Hoboken, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher.

-4-
Chapter 22 Cloud Security ........................................................ 63
Chapter 33 IoT Security ........................................................... 65
© 2020 Pearson Education, Inc., Hoboken, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher.

-5-
CHAPTER 11 CRYPTOGRAPHIC HASH
FUNCTIONS
ANSWERS TO QUESTIONS
11.1 1. H can be applied to a block of data of any size.
2. H produces a fixed-length output.
3. H(x) is relatively easy to compute for any given x, making both
hardware and software implementations practical.
4. For any given value h, it is computationally infeasible to find x such
that H(x) = h. This is sometimes referred to in the literature as the
one-way property.
5. For any given block x, it is computationally infeasible to find y ≠ x
with H(y) = H(x).
6. It is computationally infeasible to find any pair (x, y) such that H(x)
= H(y).
11.2 Property 5 in Question 11.9 defines weak collision resistance.
Property 6 defines strong collision resistance.
11.3 A typical hash function uses a compression function as a basic building
block, and involves repeated application of the compression function.
11.4 In little-endian format, the least significant byte of a word is in the
low-address byte position. In big-endian format, the most significant
byte of a word is in the low-address byte position.
11.5 Addition modulo 2
64
or 2
32
, circular shift, primitive Boolean functions
based on AND, OR, NOT, and XOR.
11.6 The criteria fall into three categories:
•Security: The evaluation considered the relative security of the
candidates compared to each other and to SHA-2. In addition, specific
security requirements related to various applications and resistance to
attacks are included in this category.
•Cost: NIST intends SHA-3 to be practical in a wide range of
applications. Accordingly, SHA-3 must have high computational
efficiency, so as to be usable in high-speed applications, such as
broadband links, and low memory requirements.
•Algorithm and implementation characteristics: This category
includes a variety of considerations, including flexibility; suitability for
© 2020 Pearson Education, Inc., Hoboken, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher.
剩余65页未读,继续阅读
资源推荐
资源评论

184 浏览量

2021-06-16 上传

197 浏览量

155 浏览量
2025-02-01 上传


123 浏览量
132 浏览量
2019-09-23 上传

2015-11-14 上传
2021-01-06 上传
193 浏览量
2023-09-19 上传
2024-06-10 上传
2019-12-20 上传



2024-07-02 上传
2021-03-04 上传
161 浏览量
646 浏览量
资源评论


码奴也要站着掉发
- 粉丝: 2
上传资源 快速赚钱
我的内容管理 展开
我的资源 快来上传第一个资源
我的收益
登录查看自己的收益我的积分 登录查看自己的积分
我的C币 登录后查看C币余额
我的收藏
我的下载
下载帮助


最新资源
- 图书管理系统数据库需求分析.docx
- 计算机科学与技术专业数据结构试题2(最终).doc
- (源码)基于 React 的增强型 CLI 项目.zip
- 综合曲线坐标计算坐标换算法.pptx
- BIM技术在项目管理中的应用.doc
- 软件工程导论课程设计补考软件题目及要求.doc
- 施工项目管理方案样本.docx
- 网络设计方案-作业.doc
- 浙江大学远程教育信息系统安全第三次作业答案.doc
- 国家开放大学电大专科《文学概论》机考网络考试第四套标准试题及答案.docx
- JAVA课程设计-ATM机模拟系统.doc
- (源码)基于ARM的远程门禁与通信系统.zip
- (源码)基于HTML和CSS的网页仿造项目.zip
- (源码)基于Python语言的弹球游戏项目.zip
- 基于TensorFlow的深度学习、深度增强学习代码:NN(传统神经网络)、CNN(卷积神经网络)、RNN(递归神经网络)、LSTM(长短期记忆网络)、GAN(生成对抗网络)、DRL(深度增强学习)
- (源码)基于物联网和AWS的任务提醒系统.zip
安全验证
文档复制为VIP权益,开通VIP直接复制
