Chapter 7 Security in computer networks 电气15 01041129 杨菁

advertisement
Chapter 7
Security in computer networks
电气 15
01041129
杨菁
1. What is the difference between an active and a passive intruder?
Answer: A passive intruder can listen to and record the
control and data messages on the channel; an active
intruder can remove messages from the channel and/or add
messages into the channel.
2. What is an important difference between a symmetric key system
and a public key system?
Answer: In the symmetric key systems, the sender’s and the
receiver’s keys are identical and secret. But in the public key
systems, a pair of keys is used. One key is known to the
public, while the other is known only by either the sender or
the receiver.
3. Suppose that an intruder has an encrypted messages as well as the
decrypted version of that message. Can the intruder mount a
cipher-text only attack, a known-plaintext, or a chosen-plaintext
attack?
Answer: The intruder can mount a known-plaintext attack.
4. What is the purpose of a nonce in an authentication protocol?
Answer: The nonce is used to ensure that the sender is
“live”.
5. What does it mean for a signed document to be verifiable,
nonforgeable, and nonrepudiable?
Answer: That is, it must be possible to “prove” that a document
signed by an individual was indeed signed by that individual (the
signature must be verifiable) and that only that individual could
have signed the document (the signature cannot be forged, and a
signer cannot later repudiate or deny having signed the document.)
Download