Solution for Cryptography and Network Security 4th Edition

Only available on StudyMode
  • Download(s) : 1497
  • Published : May 3, 2012
Open Document
Text Preview
SOLUTIONS MANUAL
CRYPTOGRAPHY AND NETWORK SECURITY
PRINCIPLES AND PRACTICE FOURTH EDITION

WILLIAM STALLINGS

Copyright 2006: William Stallings

-2-

© 2006 by William Stallings All rights reserved. No part of this document may be reproduced, in any form or by any means, or posted on the Internet, without permission in writing from the author.

-3-

NOTICE

This manual contains solutions to all of the review questions and homework problems in Cryptography and Network Security, Fourth Edition. If you spot an error in a solution or in the wording of a problem, I would greatly appreciate it if you would forward the information via email to ws@shore.net. An errata sheet for this manual, if needed, is available at ftp://shell.shore.net/members/w/s/ws/S. W.S.

-4-

TABLE OF CONTENTS

Chapter 1: Chapter 2: Chapter 3: Chapter 4: Chapter 5: Chapter 6: Chapter 7: Chapter 8: Chapter 9: Chapter 10: Chapter 11: Chapter 12: Chapter 13: Chapter 14: Chapter 15: Chapter 16: Chapter 17: Chapter 18: Chapter 19: Chapter 20:

Introduction ..................................................................................................5 Classical Encryption Techniques ...............................................................7 Block Ciphers and the Date Encryption Standard.................................13 Finite Fields .................................................................................................21 Advanced Encryption Standard...............................................................28 More on Symmetric Ciphers.....................................................................33 Confidentiality Using Symmetric Encryption........................................38 Introduction to Number Theory ..............................................................42 Public-Key Cryptography and RSA ........................................................46 Key Management; Other Public-Key Cryptosystems ...........................55 Message Authentication and Hash Functions .......................................59 Hash and MAC Algorithms......................................................................62 Digital Signatures and Authentication Protocols ..................................66 Authentication Applications ....................................................................71 Electronic Mail Security.............................................................................73 IP Security ...................................................................................................76 Web Security ...............................................................................................80 Intruders ......................................................................................................83 Malicious Software.....................................................................................87 Firewalls ......................................................................................................89

-5-

CHAPTER 1 INTRODUCTION ANSWERS TO QUESTIONS
1.1 The OSI Security Architecture is a framework that provides a systematic way of defining the requirements for security and characterizing the approaches to satisfying those requirements. The document defines security attacks, mechanisms, and services, and the relationships among these categories. 1.2 Passive attacks have to do with eavesdropping on, or monitoring, transmissions. Electronic mail, file transfers, and client/server exchanges are examples of transmissions that can be monitored. Active attacks include the modification of transmitted data and attempts to gain unauthorized access to computer systems. Passive attacks: release of message contents and traffic analysis. Active attacks: masquerade, replay, modification of messages, and denial of service.

1.3

1.4 Authentication: The assurance that the communicating entity is the one that it claims to be. Access control: The prevention of...
tracking img