Solution for Cryptography and Network Security 4th Edition

Topics: Cryptography, Cipher, Key Pages: 70 (21530 words) Published: May 3, 2012
SOLUTIONS MANUAL
CRYPTOGRAPHY AND NETWORK SECURITY
PRINCIPLES AND PRACTICE FOURTH EDITION

WILLIAM STALLINGS

Copyright 2006: William Stallings

-2-

© 2006 by William Stallings All rights reserved. No part of this document may be reproduced, in any form or by any means, or posted on the Internet, without permission in writing from the author.

-3-

NOTICE

This manual contains solutions to all of the review questions and homework problems in Cryptography and Network Security, Fourth Edition. If you spot an error in a solution or in the wording of a problem, I would greatly appreciate it if you would forward the information via email to ws@shore.net. An errata sheet for this manual, if needed, is available at ftp://shell.shore.net/members/w/s/ws/S. W.S.

-4-

TABLE OF CONTENTS

Chapter 1: Chapter 2: Chapter 3: Chapter 4: Chapter 5: Chapter 6: Chapter 7: Chapter 8: Chapter 9: Chapter 10: Chapter 11: Chapter 12: Chapter 13: Chapter 14: Chapter 15: Chapter 16: Chapter 17: Chapter 18: Chapter 19: Chapter 20:

Introduction ..................................................................................................5 Classical Encryption Techniques ...............................................................7 Block Ciphers and the Date Encryption Standard.................................13 Finite Fields .................................................................................................21 Advanced Encryption Standard...............................................................28 More on Symmetric Ciphers.....................................................................33 Confidentiality Using Symmetric Encryption........................................38 Introduction to Number Theory ..............................................................42 Public-Key Cryptography and RSA ........................................................46 Key Management; Other Public-Key Cryptosystems ...........................55 Message Authentication and Hash Functions .......................................59 Hash and MAC Algorithms......................................................................62 Digital Signatures and Authentication Protocols ..................................66 Authentication Applications ....................................................................71 Electronic Mail Security.............................................................................73 IP Security ...................................................................................................76 Web Security ...............................................................................................80 Intruders ......................................................................................................83 Malicious Software.....................................................................................87 Firewalls ......................................................................................................89

-5-

CHAPTER 1 INTRODUCTION ANSWERS TO QUESTIONS
1.1 The OSI Security Architecture is a framework that provides a systematic way of defining the requirements for security and characterizing the approaches to satisfying those requirements. The document defines security attacks, mechanisms, and services, and the relationships among these categories. 1.2 Passive attacks have to do with eavesdropping on, or monitoring, transmissions. Electronic mail, file transfers, and client/server exchanges are examples of transmissions that can be monitored. Active attacks include the modification of transmitted data and attempts to gain unauthorized access to computer systems. Passive attacks: release of message contents and traffic analysis. Active attacks: masquerade, replay, modification of messages, and denial of service.

1.3

1.4 Authentication: The assurance that the communicating entity is the one that it claims to be. Access control: The prevention of...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Cryptography & Network Security Essay
  • NETWORK SECURITY Essay
  • Cryptography And Network Security Princ Essay
  • Cryptography and Network Security Essay
  • Guide to Network Security quiz 3 Essay
  • Network Security Essay
  • network cryptography Essay
  • network security strategy SOF Answer Essay

Become a StudyMode Member

Sign Up - It's Free