Chapter 15
1. PGP Cryptographic Functions(Figure 15.1) (p. 439)
Confidentiality and authentication
Figure 15.1(c):
Chapter 15
1. PGP Cryptographic Functions(Figure 15.1) (p. 439)
Confidentiality and authentication
Figure 15.1(c):
Chapter 9
1. Public-key cryptology
Based on Mathematics, rather than Substitution and Permutation.
Using two keys, rather than only one key.
Chapter 7
1. Placement of Encryption Function
Two major approaches(Figure. 7.2) (p. 205)
a). Link encryption
Chapter 3
1. DES (Data Encryption Standard) (p. 72)
Encrypted in 64-bit blocks using 56-bit key.
Considerable controversy over design
Chapter 2
Basic Terminology
1. plaintext(明文) - the original message.
2. ciphertext(密文) - the coded message.
Chapter 1
1. Security Definition(p. 2)
(1). Computer Security(電腦安全)
generic name for the collection of tools designed to protect data
手邊沒有完整的題目,所以只寫出前兩年沒有的問題。
2004 Fall Network Security Midterm Exam
4. [Digital Signature]
What are the three functions(services)that can be achieved by
2003 Fall Network Security Midterm Exam
1.[Public-key Cryptosystem]
Draw the public-key cryptosystem with secrecy and authentication.(10%)
ans: Fgure 9.4 (p. 265)
2002 Fall Network Security Midterm Exam
1. [Public-Key Cryptosystem]
Draw the public-key cryptosystem with secrecy and authentication. (20%)
ans: Fgure 9.4 (p. 265)