密码编码学与网络安全_答案WORKSECURITYPrinciplesandPracticeFourthEdition WilliamStallingsTABLEOFCONTENTSChapter1: Introduction 5Chapter2: ClassicalEncryptionTechniques 7Chapter3: BlockCiphersandtheDateEncryptionStandard 13Chapter4: FiniteFields 21Chapter5: AdvancedEncryptionStandard 28Chapter6: iphers 33Chapter7: ConfidentialityUsingSymmetricEncryption 38Chapter8: IntroductiontoNumberTheory 42Chapter9: Public-KeyCryptographyandRSA 46Chapter10: KeyManagement;OtherPublic-KeyCryptosystems 55Chapter11: MessageAuthenticationandHashFunctions 59Chapter12: HashandMACAlgorithms 62Chapter13: DigitalSignaturesandAuthenticationProtocols 66Chapter14: AuthenticationApplications 71Chapter15: ElectronicMailSecurity 73Chapter16: IPSecurity 76Chapter17: WebSecurity 80Chapter18: Intruders 83Chapter19: MaliciousSoftware 87Chapter20: Firewalls ,mechanisms,andservices, Passiveattackshavetodowitheavesdroppingon,ormonitoring,,filetransfers,andclient/ Passiveattacks::masquerade,replay,modificationofmessages, Authentication:hatitclaimstobe. Accesscontrol:Thepreventionofunauthorizeduseofaresource(.,esstoaresource,ur,essingtheresourceareallowedtodo). Dataconfidentiality:Theprotectionofdatafromunauthorizeddisclosure. Dataintegrity:Theassurancethatdatareceivedareexactlyassentbyanauthorizedentity(.,containnomodification,insertion,deletion,orreplay). Nonrepudiation:munication. Availabilityservice:essibleandusableupondemandbyanauthorizedsystementity,accordingtoperformancespecificationsforthesystem(.,ordingtothesystemdesignwheneverusersrequestthem). SeeTable1.
密码编码学与网络安全 答案 来自淘豆网www.taodocs.com转载请标明出处.