首页 > 其他分享 >Week8:Security : Encrypting and Signing

Week8:Security : Encrypting and Signing

时间:2022-11-11 22:15:01浏览次数:60  
标签:www Signing What Week8 secret key using Security message

Week8:Security : Encrypting and Signing

1. Which of the following is true of security?
Perfect security is achievable and requires a trade-off with cost

2. What is the difference between active and passive wiretapping?
In passive wiretapping the network is snooped whereas in active wiretapping the network data is altered

3. Integrity is preserved if
The information you receive is from who you think it is and has not been modified since it was sent

4. Which of the following factors has the smallest effect on the strength of a cryptosystem?
The data being transmitted

5. What is one possible advantage of public-key cryptosystems over secret-key ones?
Public-key cryptosystems do not have the problem of secure key distribution

6.What does it mean if a cryptosystem is symmetric-key in nature?
The key used for encryption is not the same as the key used for decryption

7. The following question is encrypted using a Caesar Cipher with a shift of 13. You can use www.rot13.com to decrypt the question.
Jub vf perqvgrq nf orvat bar bs gur vairagbef bs Rgurearg?
Bob Metcalfe

8. The following question is encrypted using a Caesar Cipher with a shift of 13. You can use www.rot13.com to decrypt the question and answers.

  • Jung qbrf gur Gjvggre unfugnt #VUGF fgnaq sbe?
  • Vagrearg Uvfgbel, Grpuabybtl, naq Frphevgl

9. What is the SHA-1 hash of the string below as computed by http://www.dr-chuck.com/sha1.php

  • The Transport Layer does retransmission
  • 1399edc7e55f7be8dbc7024bcb8830527722e179

10. What does a cryptographic hash function do?
It takes a block of data and returns a fixed-size bit string called the hash value

11. What critical element does simple digest-based Message Signing as described in lecture depend on?
The sharing of a secret transported securely ‘out of band’

12. What is the problem with secret key distribution via the internet?
The communication of the secret key is insecure

13. You are going to send the message below using shared secret of IHTS. Use http://www.dr-chuck.com/sha1.php to compute your message digest using the technique from lecture. What will the first six characters of the digest/signature that you send along with the message?

  • Be sure to drink more Ovaltine
  • 8b4258

14. Select the valid signed message(s) from Annie if your shared secret is IHTS? Use http://www.dr-chuck.com/sha1.php to compute your message digests using the technique from lecture. Only the first 6 characters of the SHA1 message digest are shown below.

  • Bring me cookies51be4e
  • Everything is all right7dd244

标签:www,Signing,What,Week8,secret,key,using,Security,message
From: https://www.cnblogs.com/jqhuang2021/p/16882166.html

相关文章

  • 2010 Principles on the Security of AES against First and Second-Order Differenti
    一、对于AES算法的DPA攻击准则(无防护措施下的AES实现)(1)在第3轮列混淆前任意中间值可以用于一阶DPA攻击,该攻击将明文的0,3或15比特固定(2)在第7轮轮......
  • 2010 Principles on the Security of AES against First and Second-Order Differenti
    一、对于AES算法的DPA攻击准则(无防护措施下的AES实现)(1)在第3轮列混淆前任意中间值可以用于一阶DPA攻击,该攻击将明文的0,3或15比特固定(2)在第7轮轮......
  • Pod Security Admission
    Kubernetes Pod安全性标准(SecurityStandards) 为Pod定义不同的隔离级别。这些标准能够让你以一种清晰、一致的方式定义如何限制Pod行为。作为一项Beta功能特性,Ku......
  • Submarine Spark Security Plugin介绍(0.6.0版本)
    参考https://submarine.apache.org/zh-cn/docs/0.6.0/userDocs/submarine-security/spark-security/从ranger的github地址https://github.com/apache/ranger中可以发现当......
  • Spring Security 知识点总结
    Security部分WebSecurityConfigurerAdaptersecurity配置的核心类在这里配置权限等信息authenticationauthentication是认证(登陆)authorizationauthorizati......
  • Spring Security 知识点总结
    Security部分WebSecurityConfigurerAdaptersecurity配置的核心类在这里配置权限等信息authenticationauthentication是认证(登陆)authorizationauthorizati......
  • Security concepts in Microsoft Dataverse
    AssociateabusinessunitwithanAzureADsecuritygroupYoucanuseanAzureADsecuritygrouptomapyourbusinessunitforstreamliningyouruseradministr......
  • SECURITY_ATTRIBUTES 实现最低权限总结
    SetSecurityDescriptorDacl函数可以用来设置DACL中的信息。如果一个DACL已经在securitydescriptor中存在,那么此DACL将被替换。值得注意的是MSDN中的Remarks中有这样的描......
  • Spring Security安全控制之快速入门
    在SpringCloud之服务注册中心搭建EurekaServer服务注册中⼼-池塘里洗澡的鸭子-博客园(cnblogs.com)中,一旦启动了Eureka服务器,就可以直接Eureka服务器管理界面—......
  • Spring Security入门(二十九)
    1引入依赖<dependency><groupId>org.springframework.boot</groupId><artifactId>spring-boot-starter-security</artifactId></dependency>2设置实体体权......