SOLUTIONS MANUAL C N S P S E - Solution Manual Manual .

3y ago
47 Views
12 Downloads
679.25 KB
9 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Philip Renner
Transcription

SOLUTIONS MANUALC RYPTOGRAPHY ANDN ETWORK S ECURITY :P RINCIPLES AND P RACTICES EVENTH E DITIONC HAPTERS 1–10W ILLIAM S TALLINGSCopyright 2016: William Stallings 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.

2016 by William StallingsAll rights reserved. No partof this document may bereproduced, in any form orby any means, or posted onthe Internet, withoutpermission in writing fromthe author. Selectedsolutions may be sharedwith students, providedthat they are not available,unsecured, on the Web.-2 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.

NOTICEThis manual contains solutions to the reviewquestions and homework problems inCryptography and Network Security, SixthEdition. If you spot an error in a solution or inthe wording of a problem, I would greatlyappreciate it if you would forward theinformation via email to wllmst@me.net. Anerrata sheet for this manual, if needed, isavailable athttps://www.box.com/shared/nh8hti5167 Filename is S-Crypto7e-mmyy.W.S.-3 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.

TABLE OF CONTENTSChapter 1 Introduction . 5Chapter 2 Introduction to Number Theory . 10Chapter 3 Classical Encryption Techniques . 18Chapter 4 Block Ciphers and the Data Encryption Standard . 27Chapter 5 Finite Fields . 38Chapter 6 Advanced Encryption Standard . 44Chapter 7 Block Cipher Operation . 51Chapter 8 Random and Pseudorandom Number Generation andStream Ciphers . 57Chapter 9 Public-Key Cryptography and RSA . 61Chapter 10 Other Public-Key Cryptosystems . 71-4 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.

CHAPTER 1 INTRODUCTIONANSWERS TO QUESTIONS1.1 The OSI Security Architecture is a framework that provides a systematicway of defining the requirements for security and characterizing theapproaches to satisfying those requirements. The document definessecurity attacks, mechanisms, and services, and the relationshipsamong these categories.1.2 Passive threats have to do with eavesdropping on, or monitoring,transmissions. Electronic mail, file transfers, and client/serverexchanges are examples of transmissions that can be monitored. Activethreats include the modification of transmitted data and attempts togain unauthorized access to computer systems.1.3 Passive attacks: release of message contents and traffic analysis.Active attacks: masquerade, replay, modification of messages, anddenial of service.1.4 Authentication: The assurance that the communicating entity is theone that it claims to be.Access control: The prevention of unauthorized use of a resource (i.e.,this service controls who can have access to a resource, under whatconditions access can occur, and what those accessing the resource areallowed to do).Data confidentiality: The protection of data from unauthorizeddisclosure.Data integrity: The assurance that data received are exactly as sent byan authorized entity (i.e., contain no modification, insertion, deletion, orreplay).Nonrepudiation: Provides protection against denial by one of theentities involved in a communication of having participated in all or partof the communication.Availability service: The property of a system or a system resourcebeing accessible and usable upon demand by an authorized systementity, according to performance specifications for the system (i.e., asystem is available if it provides services according to the system designwhenever users request them).-5 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.

1.5 See Table 1.3.1.6 Authentication: The assurance that the communicating entity is theone that it claims to be.Access control: The prevention of unauthorized use of a resource (i.e.,this service controls who can have access to a resource, under whatconditions access can occur, and what those accessing the resource areallowed to do).Data confidentiality: The protection of data from unauthorizeddisclosure.Data integrity: The assurance that data received are exactly as sent byan authorized entity (i.e., contain no modification, insertion, deletion, orreplay).Nonrepudiation: Provides protection against denial by one of theentities involved in a communication of having participated in all or partof the communication.Availability service: The property of a system or a system resourcebeing accessible and usable upon demand by an authorized systementity, according to performance specifications for the system (i.e., asystem is available if it provides services according to the system designwhenever users request them).1.7 An attack surface consists of the reachable and exploitablevulnerabilities in a system. An attack tree is a branching, hierarchicaldata structure that represents a set of potential techniques forexploiting security vulnerabilities.ANSWERS TO PROBLEMS1.1 The system must keep personal identification numbers confidential, bothin the host system and during transmission for a transaction. It mustprotect the integrity of account records and of individual transactions.Availability of the host system is important to the economic well beingof the bank, but not to its fiduciary responsibility. The availability ofindividual teller machines is of less concern.1.2 The system does not have high requirements for integrity on individualtransactions, as lasting damage will not be incurred by occasionallylosing a call or billing record. The integrity of control programs andconfiguration records, however, is critical. Without these, the switchingfunction would be defeated and the most important attribute of all availability - would be compromised. A telephone switching system mustalso preserve the confidentiality of individual calls, preventing one callerfrom overhearing another.-6 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.

1.3 a. The system will have to assure confidentiality if it is being used topublish corporate proprietary material.b. The system will have to assure integrity if it is being used to laws orregulations.c. The system will have to assure availability if it is being used to publisha daily paper.1.4 a. An organization managing public information on its web serverdetermines that there is no potential impact from a loss ofconfidentiality (i.e., confidentiality requirements are not applicable), amoderate potential impact from a loss of integrity, and a moderatepotential impact from a loss of availability.b. A law enforcement organization managing extremely sensitiveinvestigative information determines that the potential impact from aloss of confidentiality is high, the potential impact from a loss ofintegrity is moderate, and the potential impact from a loss ofavailability is moderate.c. A financial organization managing routine administrative information(not privacy-related information) determines that the potential impactfrom a loss of confidentiality is low, the potential impact from a loss ofintegrity is low, and the potential impact from a loss of availability islow.d. The management within the contracting organization determines that:(i) for the sensitive contract information, the potential impact from aloss of confidentiality is moderate, the potential impact from a loss ofintegrity is moderate, and the potential impact from a loss ofavailability is low; and (ii) for the routine administrative information(non-privacy-related information), the potential impact from a loss ofconfidentiality is low, the potential impact from a loss of integrity islow, and the potential impact from a loss of availability is low.e. The management at the power plant determines that: (i) for thesensor data being acquired by the SCADA system, there is nopotential impact from a loss of confidentiality, a high potential impactfrom a loss of integrity, and a high potential impact from a loss ofavailability; and (ii) for the administrative information beingprocessed by the system, there is a low potential impact from a lossof confidentiality, a low potential impact from a loss of integrity, and alow potential impact from a loss of availability. Examples from FIPS199.-7 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.

dePeer entityauthenticationYData originauthenticationYAccess controlYConfidentialityReplayModification Denialof messages ofserviceYYTraffic flowconfidentialityData radeReplayYYYYYDigital signatureAccess controlYYData integrityAuthenticationexchangeYYTraffic paddingRouting controlModification Denialof messages ofserviceYYYYYYYYYYNotarizationYY1.7-8 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.Y

Open SafePick LockLearnCombinationFind Written ComboThreatenCut OpenSafeInstallImproperlyGet Combofrom TargetBlackmailEavesdropListen toConversationBribeGet Target toState Combo1.8 We present the tree in text form; call the company X:Survivability Compromise: Disclosure of X proprietary secretsOR 1. Physically scavenge discarded items from XOR 1. Inspect dumpster content on-site2. Inspect refuse after removal from site2. Monitor emanations from X machinesAND 1. Survey physical perimeter to determine optimal monitoring position2. Acquire necessary monitoring equipment3. Setup monitoring site4. Monitor emanations from site3. Recruit help of trusted X insiderOR 1. Plant spy as trusted insider2. Use existing trusted insider4. Physically access X networks or machinesOR 1. Get physical, on-site access to Intranet2. Get physical access to external machines5. Attack X intranet using its connections with InternetOR 1. Monitor communications over Internet for leakage2. Get trusted process to send sensitive information to attacker over Internet3. Gain privileged access to Web server6. Attack X intranet using its connections with public telephone network (PTN)OR 1. Monitor communications over PTN for leakage of sensitive information2. Gain privileged access to machines on intranet connected via Internet-9 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.

-6- 1.5 See Table 1.3. 1.6 Authentication: The assurance that the communicating entity is the one that it claims to be. Access control: The prevention of unauthorized use of a resource (i.e., this service controls who can have access to a resource, under what conditions access can occur, and what those accessing the resource are

Related Documents:

Independent Personal Pronouns Personal Pronouns in Hebrew Person, Gender, Number Singular Person, Gender, Number Plural 3ms (he, it) א ִוה 3mp (they) Sֵה ,הַָּ֫ ֵה 3fs (she, it) א O ה 3fp (they) Uֵה , הַָּ֫ ֵה 2ms (you) הָּ תַא2mp (you all) Sֶּ תַא 2fs (you) ְ תַא 2fp (you

This solutions manual contains solutions for all odd numbered problems plus a large number of solutions for even numbered problems. Of the 624 exercises in Statistical Inference, Second Edition, this manual gives solutions for 484 (78%) of them. There is an obtuse pattern as to which solutions were included in this manual.

SOLUTION maNUaL n Solutions for Diagnostic Test n Solutions for Language Comprehension n Solutions for mathematical Skills n Solutions for Data analysis and Data Sufficiency n Solutions for Intelligence and Critical Reasoning n Solutions for mock Tests (1 to 5) 01_Solutions 01.indd 1 10/30/2009 11:56:28 AM

Cisco 819G-S-K9 Integrated Solutions Router 15.2(4)M6A Cisco 819HG-4G-G-K9 Integrated Solutions Router 15.2(4)M6A Cisco 891 Integrated Solutions Router 15.2(4)M6A Cisco 881 Integrated Solutions Router 15.2(4)M6A Cisco 1905 Integrated Solutions Router 15.2(4)M6A Cisco 1921 Integrated Solutions Router 15.2(4)M6A Cisco 1941 Integrated Solutions .

Solutions Manual Fundamentals, Practice and Modeling Upper Saddle River, NJ. By Plummer, Deal and Griffin . Solutions Manual Fundamentals, Practice and Modeling Upper Saddle River, NJ. By Plummer, Deal and Griffin . Solutions Manual .

Solutions manual has not been cross checked for accuracy. If you disagree with this solutions manual you should check with your instructor. Should you find an error, please E-mail tylerw@bigbend.edu so it can be corrected. Thank you! Beginning Algebra Student Solutions Manual by Tyler Wallace is licensed under a

Solutions Manual for Operations Research An Introduction 10th Edition by Taha IBSN 9780134444017 Author: Taha" Subject: Solutions Manual for Operations Research An Introduction 10th Edition by Taha IBSN 9780134444017Instant Download Keywords: 10th Edition; Operations Research An Introduction; Solutions Manual; Taha Created Date: 12/5/2015 4:50 .

Solutions Manual for Structural Analysis 5th Edition by Aslam Kassimali Author: Aslam Kassimali" Subject: Solutions Manual for Structural Analysis 5th Edition by Aslam KassimaliInstant Download Keywords: 5th Edition; Aslam Kassimali; Solutions Manual; Structural Analysis Created Date: 12/5/2015 4:50:30 PM