文档介绍:S OLUTIONS M ANUAL CRYPTOGRAPHY WORK SECURITY P RINCIPLES AND P RACTICE F OURTH E DITION W ILLIAM S TALLINGS - 2- The OSI Security Architecture isa framework that provides a systematic way of defining the requirements for security and characterizing the approaches to satisfying those requirements. The document defines security attacks, mechanisms, and services, and the relationships among these categories. Passive attacks have to do with eavesdropping on, or monitoring, transmissions. Electronic mail, file transfers, and client/server exchanges are examples of transmissions that can be monitored. Active attacks include the modification of transmitted data and attempts to gain unauthorized access puter systems. Passive attacks: release of message contents and traffic analysis. Active attacks: masquerade, replay, modification of messages, and denial of service. TABLE OF CONTENTS Chapter 1: Introduction ........................................................................................... 5 Chapter 2: Classical Encryption Techniques .............................................. 7 Chapter 3: Block Ciphers and the Date Encryption Standard ....... 13 Chapter 4: Finite Fields ....................................................................................... 21 Chapter 5: Advanced Encryption Standard ................................................... 28 Chapter 6: More on Symmetric Ciphers .......................................................... 33 Chapter 7: Confidentiality Using Symmetric Encryption ................. 38 Chapter 8: Introduction to Number Theory ................................................ 42 Chapter 9: Public-Key Cryptography and RSA ........................................... 46 Chapter 10: Key Management; Other Public-Key Cryptosystems ....... 55 Chapter 11: Message Authentication and Hash Functions ................... 59 Chapter 12: Hash and MAC Algorithms ............................................................... 62 C