Вы находитесь на странице: 1из 54

CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE

Subject : CRYPTOGRAPHY AND NETWORK SECURITY


PRINCIPLES AND PRACTICE
Chapter 1 Overview
1. Concepts and Definition of Computer Security - Answer (click here)
2. The Challenges of Computer Security - Answer (click here)
3. The OSI Security Architecture - Answer (click here)
4. Security Attacks: Passive and Active Attacks - Answer (click here)
5. Security Services - Answer (click here)
6. Security Mechanisms - Answer (click here)
7. A Model For Network Security - Answer (click here)
8. Classical Encryption Techniques - Answer (click here)

PART ONE SYMMETRIC CIPHERS


Chapter 2 Classical Encryption Techniques
1. Concepts and Definition of Computer Security - Answer (click here)
2. The Challenges of Computer Security - Answer (click here)
3. The OSI Security Architecture - Answer (click here)
4. Security Attacks: Passive and Active Attacks - Answer (click here)
5. Security Services - Answer (click here)
6. Security Mechanisms - Answer (click here)
7. A Model For Network Security - Answer (click here)
8. Classical Encryption Techniques - Answer (click here)
9. Symmetric Cipher Model - Answer (click here)
10. Substitution Techniques - Answer (click here)
11. Transposition Techniques - Answer (click here)
12. Rotor Machines - Answer (click here)
13. Steganography - Answer (click here)

Chapter 3 Block Ciphers and the Data Encryption Standard


1. Concepts and Definition of Computer Security - Answer (click here)
2. The Challenges of Computer Security - Answer (click here)
3. The OSI Security Architecture - Answer (click here)
4. Security Attacks: Passive and Active Attacks - Answer (click here)
5. Security Services - Answer (click here)
6. Security Mechanisms - Answer (click here)
7. A Model For Network Security - Answer (click here)
8. Classical Encryption Techniques - Answer (click here)
9. Symmetric Cipher Model - Answer (click here)
10. Substitution Techniques - Answer (click here)
11. Transposition Techniques - Answer (click here)
12. Rotor Machines - Answer (click here)
13. Steganography - Answer (click here)
14. Block Ciphers and the Data Encryption Standard - Answer (click here)
15. Block Cipher Principles - Answer (click here)
16. The Data Encryption Standard - Answer (click here)
17. A DES(Data Encryption Standard) Example - Answer (click here)
18. The Strength of DES(Data Encryption Standard) - Answer (click here)
19. Differential and Linear Cryptanalysis - Answer (click here)
20. Block Cipher Design Principles - Answer (click here)

Chapter 4 Basic Concepts in Number Theory and Finite Fields


1. Concepts and Definition of Computer Security - Answer (click here)
2. The Challenges of Computer Security - Answer (click here)
3. The OSI Security Architecture - Answer (click here)
4. Security Attacks: Passive and Active Attacks - Answer (click here)
5. Security Services - Answer (click here)
6. Security Mechanisms - Answer (click here)
7. A Model For Network Security - Answer (click here)
8. Classical Encryption Techniques - Answer (click here)
9. Symmetric Cipher Model - Answer (click here)
10. Substitution Techniques - Answer (click here)
11. Transposition Techniques - Answer (click here)
12. Rotor Machines - Answer (click here)
13. Steganography - Answer (click here)
14. Block Ciphers and the Data Encryption Standard - Answer (click here)
15. Block Cipher Principles - Answer (click here)
16. The Data Encryption Standard - Answer (click here)
17. A DES(Data Encryption Standard) Example - Answer (click here)
18. The Strength of DES(Data Encryption Standard) - Answer (click here)
19. Differential and Linear Cryptanalysis - Answer (click here)
20. Block Cipher Design Principles - Answer (click here)
21. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
22. Divisibility and the Division Algorithm - Answer (click here)
23. The Euclidean Algorithm - Answer (click here)
24. Modular Arithmetic - Answer (click here)
25. Groups, Rings, and Fields - Answer (click here)
26. Finite Fields Of The Form GF(p) - Answer (click here)
27. Polynomial Arithmetic - Answer (click here)
28. Finite Fields of the Form GF(2n) - Answer (click here)

Chapter 5 Advanced Encryption Standard


1. Concepts and Definition of Computer Security - Answer (click here)
2. The Challenges of Computer Security - Answer (click here)
3. The OSI Security Architecture - Answer (click here)
4. Security Attacks: Passive and Active Attacks - Answer (click here)
5. Security Services - Answer (click here)
6. Security Mechanisms - Answer (click here)
7. A Model For Network Security - Answer (click here)
8. Classical Encryption Techniques - Answer (click here)
9. Symmetric Cipher Model - Answer (click here)
10. Substitution Techniques - Answer (click here)
11. Transposition Techniques - Answer (click here)
12. Rotor Machines - Answer (click here)
13. Steganography - Answer (click here)
14. Block Ciphers and the Data Encryption Standard - Answer (click here)
15. Block Cipher Principles - Answer (click here)
16. The Data Encryption Standard - Answer (click here)
17. A DES(Data Encryption Standard) Example - Answer (click here)
18. The Strength of DES(Data Encryption Standard) - Answer (click here)
19. Differential and Linear Cryptanalysis - Answer (click here)
20. Block Cipher Design Principles - Answer (click here)
21. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
22. Divisibility and the Division Algorithm - Answer (click here)
23. The Euclidean Algorithm - Answer (click here)
24. Modular Arithmetic - Answer (click here)
25. Groups, Rings, and Fields - Answer (click here)
26. Finite Fields Of The Form GF(p) - Answer (click here)
27. Polynomial Arithmetic - Answer (click here)
28. Finite Fields of the Form GF(2n) - Answer (click here)
29. Advanced Encryption Standard(AES) - Answer (click here)
30. Finite Field Arithmetic - Answer (click here)
31. AES(Advanced Encryption Standard) Structure - Answer (click here)
32. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
33. AES Key Expansion - Answer (click here)
34. An Advanced Encryption Standard(AES) Example - Answer (click here)
35. AES(Advanced Encryption Standard) Implementation - Answer (click here)

Chapter 6 Block Cipher Operation


1. Concepts and Definition of Computer Security - Answer (click here)
2. The Challenges of Computer Security - Answer (click here)
3. The OSI Security Architecture - Answer (click here)
4. Security Attacks: Passive and Active Attacks - Answer (click here)
5. Security Services - Answer (click here)
6. Security Mechanisms - Answer (click here)
7. A Model For Network Security - Answer (click here)
8. Classical Encryption Techniques - Answer (click here)
9. Symmetric Cipher Model - Answer (click here)
10. Substitution Techniques - Answer (click here)
11. Transposition Techniques - Answer (click here)
12. Rotor Machines - Answer (click here)
13. Steganography - Answer (click here)
14. Block Ciphers and the Data Encryption Standard - Answer (click here)
15. Block Cipher Principles - Answer (click here)
16. The Data Encryption Standard - Answer (click here)
17. A DES(Data Encryption Standard) Example - Answer (click here)
18. The Strength of DES(Data Encryption Standard) - Answer (click here)
19. Differential and Linear Cryptanalysis - Answer (click here)
20. Block Cipher Design Principles - Answer (click here)
21. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
22. Divisibility and the Division Algorithm - Answer (click here)
23. The Euclidean Algorithm - Answer (click here)
24. Modular Arithmetic - Answer (click here)
25. Groups, Rings, and Fields - Answer (click here)
26. Finite Fields Of The Form GF(p) - Answer (click here)
27. Polynomial Arithmetic - Answer (click here)
28. Finite Fields of the Form GF(2n) - Answer (click here)
29. Advanced Encryption Standard(AES) - Answer (click here)
30. Finite Field Arithmetic - Answer (click here)
31. AES(Advanced Encryption Standard) Structure - Answer (click here)
32. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
33. AES Key Expansion - Answer (click here)
34. An Advanced Encryption Standard(AES) Example - Answer (click here)
35. AES(Advanced Encryption Standard) Implementation - Answer (click here)
36. Block Cipher Operation - Answer (click here)
37. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
38. Electronic Code Book - Answer (click here)
39. Cipher Block Chaining(CBC) Mode - Answer (click here)
40. Cipher Feedback Mode - Answer (click here)
41. Output Feedback Mode - Answer (click here)
42. Counter Mode - Answer (click here)
43. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)

Chapter 7 Pseudorandom Number Generation and Stream


Ciphers
1. Concepts and Definition of Computer Security - Answer (click here)
2. The Challenges of Computer Security - Answer (click here)
3. The OSI Security Architecture - Answer (click here)
4. Security Attacks: Passive and Active Attacks - Answer (click here)
5. Security Services - Answer (click here)
6. Security Mechanisms - Answer (click here)
7. A Model For Network Security - Answer (click here)
8. Classical Encryption Techniques - Answer (click here)
9. Symmetric Cipher Model - Answer (click here)
10. Substitution Techniques - Answer (click here)
11. Transposition Techniques - Answer (click here)
12. Rotor Machines - Answer (click here)
13. Steganography - Answer (click here)
14. Block Ciphers and the Data Encryption Standard - Answer (click here)
15. Block Cipher Principles - Answer (click here)
16. The Data Encryption Standard - Answer (click here)
17. A DES(Data Encryption Standard) Example - Answer (click here)
18. The Strength of DES(Data Encryption Standard) - Answer (click here)
19. Differential and Linear Cryptanalysis - Answer (click here)
20. Block Cipher Design Principles - Answer (click here)
21. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
22. Divisibility and the Division Algorithm - Answer (click here)
23. The Euclidean Algorithm - Answer (click here)
24. Modular Arithmetic - Answer (click here)
25. Groups, Rings, and Fields - Answer (click here)
26. Finite Fields Of The Form GF(p) - Answer (click here)
27. Polynomial Arithmetic - Answer (click here)
28. Finite Fields of the Form GF(2n) - Answer (click here)
29. Advanced Encryption Standard(AES) - Answer (click here)
30. Finite Field Arithmetic - Answer (click here)
31. AES(Advanced Encryption Standard) Structure - Answer (click here)
32. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
33. AES Key Expansion - Answer (click here)
34. An Advanced Encryption Standard(AES) Example - Answer (click here)
35. AES(Advanced Encryption Standard) Implementation - Answer (click here)
36. Block Cipher Operation - Answer (click here)
37. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
38. Electronic Code Book - Answer (click here)
39. Cipher Block Chaining(CBC) Mode - Answer (click here)
40. Cipher Feedback Mode - Answer (click here)
41. Output Feedback Mode - Answer (click here)
42. Counter Mode - Answer (click here)
43. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
44. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
45. Principles of Pseudorandom Number Generation - Answer (click here)
46. Pseudorandom Number Generators - Answer (click here)
47. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
48. Stream Ciphers - Answer (click here)
49. RC4 - Answer (click here)
50. True Random Number Generators - Answer (click here)

PART TWO ASYMMETRIC CIPHERS


Chapter 8 More Number Theory
1. Concepts and Definition of Computer Security - Answer (click here)
2. The Challenges of Computer Security - Answer (click here)
3. The OSI Security Architecture - Answer (click here)
4. Security Attacks: Passive and Active Attacks - Answer (click here)
5. Security Services - Answer (click here)
6. Security Mechanisms - Answer (click here)
7. A Model For Network Security - Answer (click here)
8. Classical Encryption Techniques - Answer (click here)
9. Symmetric Cipher Model - Answer (click here)
10. Substitution Techniques - Answer (click here)
11. Transposition Techniques - Answer (click here)
12. Rotor Machines - Answer (click here)
13. Steganography - Answer (click here)
14. Block Ciphers and the Data Encryption Standard - Answer (click here)
15. Block Cipher Principles - Answer (click here)
16. The Data Encryption Standard - Answer (click here)
17. A DES(Data Encryption Standard) Example - Answer (click here)
18. The Strength of DES(Data Encryption Standard) - Answer (click here)
19. Differential and Linear Cryptanalysis - Answer (click here)
20. Block Cipher Design Principles - Answer (click here)
21. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
22. Divisibility and the Division Algorithm - Answer (click here)
23. The Euclidean Algorithm - Answer (click here)
24. Modular Arithmetic - Answer (click here)
25. Groups, Rings, and Fields - Answer (click here)
26. Finite Fields Of The Form GF(p) - Answer (click here)
27. Polynomial Arithmetic - Answer (click here)
28. Finite Fields of the Form GF(2n) - Answer (click here)
29. Advanced Encryption Standard(AES) - Answer (click here)
30. Finite Field Arithmetic - Answer (click here)
31. AES(Advanced Encryption Standard) Structure - Answer (click here)
32. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
33. AES Key Expansion - Answer (click here)
34. An Advanced Encryption Standard(AES) Example - Answer (click here)
35. AES(Advanced Encryption Standard) Implementation - Answer (click here)
36. Block Cipher Operation - Answer (click here)
37. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
38. Electronic Code Book - Answer (click here)
39. Cipher Block Chaining(CBC) Mode - Answer (click here)
40. Cipher Feedback Mode - Answer (click here)
41. Output Feedback Mode - Answer (click here)
42. Counter Mode - Answer (click here)
43. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
44. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
45. Principles of Pseudorandom Number Generation - Answer (click here)
46. Pseudorandom Number Generators - Answer (click here)
47. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
48. Stream Ciphers - Answer (click here)
49. RC4 - Answer (click here)
50. True Random Number Generators - Answer (click here)
51. Introduction to Number Theory - Answer (click here)
52. Prime Numbers - Answer (click here)
53. Fermat’s And Euler’s Theorems - Answer (click here)
54. Testing for Primality - Answer (click here)
55. The Chinese Remainder Theorem - Answer (click here)
56. Discrete Logarithms - Answer (click here)

Chapter 9 Public Key Cryptography and RSA


1. Concepts and Definition of Computer Security - Answer (click here)
2. The Challenges of Computer Security - Answer (click here)
3. The OSI Security Architecture - Answer (click here)
4. Security Attacks: Passive and Active Attacks - Answer (click here)
5. Security Services - Answer (click here)
6. Security Mechanisms - Answer (click here)
7. A Model For Network Security - Answer (click here)
8. Classical Encryption Techniques - Answer (click here)
9. Symmetric Cipher Model - Answer (click here)
10. Substitution Techniques - Answer (click here)
11. Transposition Techniques - Answer (click here)
12. Rotor Machines - Answer (click here)
13. Steganography - Answer (click here)
14. Block Ciphers and the Data Encryption Standard - Answer (click here)
15. Block Cipher Principles - Answer (click here)
16. The Data Encryption Standard - Answer (click here)
17. A DES(Data Encryption Standard) Example - Answer (click here)
18. The Strength of DES(Data Encryption Standard) - Answer (click here)
19. Differential and Linear Cryptanalysis - Answer (click here)
20. Block Cipher Design Principles - Answer (click here)
21. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
22. Divisibility and the Division Algorithm - Answer (click here)
23. The Euclidean Algorithm - Answer (click here)
24. Modular Arithmetic - Answer (click here)
25. Groups, Rings, and Fields - Answer (click here)
26. Finite Fields Of The Form GF(p) - Answer (click here)
27. Polynomial Arithmetic - Answer (click here)
28. Finite Fields of the Form GF(2n) - Answer (click here)
29. Advanced Encryption Standard(AES) - Answer (click here)
30. Finite Field Arithmetic - Answer (click here)
31. AES(Advanced Encryption Standard) Structure - Answer (click here)
32. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
33. AES Key Expansion - Answer (click here)
34. An Advanced Encryption Standard(AES) Example - Answer (click here)
35. AES(Advanced Encryption Standard) Implementation - Answer (click here)
36. Block Cipher Operation - Answer (click here)
37. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
38. Electronic Code Book - Answer (click here)
39. Cipher Block Chaining(CBC) Mode - Answer (click here)
40. Cipher Feedback Mode - Answer (click here)
41. Output Feedback Mode - Answer (click here)
42. Counter Mode - Answer (click here)
43. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
44. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
45. Principles of Pseudorandom Number Generation - Answer (click here)
46. Pseudorandom Number Generators - Answer (click here)
47. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
48. Stream Ciphers - Answer (click here)
49. RC4 - Answer (click here)
50. True Random Number Generators - Answer (click here)
51. Introduction to Number Theory - Answer (click here)
52. Prime Numbers - Answer (click here)
53. Fermat’s And Euler’s Theorems - Answer (click here)
54. Testing for Primality - Answer (click here)
55. The Chinese Remainder Theorem - Answer (click here)
56. Discrete Logarithms - Answer (click here)
57. Public-Key Cryptography and RSA - Answer (click here)
58. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
59. The RSA Algorithm - Answer (click here)
60. Description of the RSA Algorithm - Answer (click here)
61. The Security of RSA - Answer (click here)

Chapter 10 Other Public Key Cryptosystems


1. Concepts and Definition of Computer Security - Answer (click here)
2. The Challenges of Computer Security - Answer (click here)
3. The OSI Security Architecture - Answer (click here)
4. Security Attacks: Passive and Active Attacks - Answer (click here)
5. Security Services - Answer (click here)
6. Security Mechanisms - Answer (click here)
7. A Model For Network Security - Answer (click here)
8. Classical Encryption Techniques - Answer (click here)
9. Symmetric Cipher Model - Answer (click here)
10. Substitution Techniques - Answer (click here)
11. Transposition Techniques - Answer (click here)
12. Rotor Machines - Answer (click here)
13. Steganography - Answer (click here)
14. Block Ciphers and the Data Encryption Standard - Answer (click here)
15. Block Cipher Principles - Answer (click here)
16. The Data Encryption Standard - Answer (click here)
17. A DES(Data Encryption Standard) Example - Answer (click here)
18. The Strength of DES(Data Encryption Standard) - Answer (click here)
19. Differential and Linear Cryptanalysis - Answer (click here)
20. Block Cipher Design Principles - Answer (click here)
21. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
22. Divisibility and the Division Algorithm - Answer (click here)
23. The Euclidean Algorithm - Answer (click here)
24. Modular Arithmetic - Answer (click here)
25. Groups, Rings, and Fields - Answer (click here)
26. Finite Fields Of The Form GF(p) - Answer (click here)
27. Polynomial Arithmetic - Answer (click here)
28. Finite Fields of the Form GF(2n) - Answer (click here)
29. Advanced Encryption Standard(AES) - Answer (click here)
30. Finite Field Arithmetic - Answer (click here)
31. AES(Advanced Encryption Standard) Structure - Answer (click here)
32. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
33. AES Key Expansion - Answer (click here)
34. An Advanced Encryption Standard(AES) Example - Answer (click here)
35. AES(Advanced Encryption Standard) Implementation - Answer (click here)
36. Block Cipher Operation - Answer (click here)
37. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
38. Electronic Code Book - Answer (click here)
39. Cipher Block Chaining(CBC) Mode - Answer (click here)
40. Cipher Feedback Mode - Answer (click here)
41. Output Feedback Mode - Answer (click here)
42. Counter Mode - Answer (click here)
43. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
44. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
45. Principles of Pseudorandom Number Generation - Answer (click here)
46. Pseudorandom Number Generators - Answer (click here)
47. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
48. Stream Ciphers - Answer (click here)
49. RC4 - Answer (click here)
50. True Random Number Generators - Answer (click here)
51. Introduction to Number Theory - Answer (click here)
52. Prime Numbers - Answer (click here)
53. Fermat’s And Euler’s Theorems - Answer (click here)
54. Testing for Primality - Answer (click here)
55. The Chinese Remainder Theorem - Answer (click here)
56. Discrete Logarithms - Answer (click here)
57. Public-Key Cryptography and RSA - Answer (click here)
58. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
59. The RSA Algorithm - Answer (click here)
60. Description of the RSA Algorithm - Answer (click here)
61. The Security of RSA - Answer (click here)
62. Other Public-Key Cryptosystems - Answer (click here)
63. Diffie-Hellman Key Exchange - Answer (click here)
64. Elgamal Cryptographic System - Answer (click here)
65. Elliptic Curve Arithmetic - Answer (click here)
66. Elliptic Curve Cryptography - Answer (click here)
67. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)

PART THREE CRYPTOGRAPHIC DATA INTEGRITY


ALGORITHMS
Chapter 11 Cryptographic Hash Functions
1. Concepts and Definition of Computer Security - Answer (click here)
2. The Challenges of Computer Security - Answer (click here)
3. The OSI Security Architecture - Answer (click here)
4. Security Attacks: Passive and Active Attacks - Answer (click here)
5. Security Services - Answer (click here)
6. Security Mechanisms - Answer (click here)
7. A Model For Network Security - Answer (click here)
8. Classical Encryption Techniques - Answer (click here)
9. Symmetric Cipher Model - Answer (click here)
10. Substitution Techniques - Answer (click here)
11. Transposition Techniques - Answer (click here)
12. Rotor Machines - Answer (click here)
13. Steganography - Answer (click here)
14. Block Ciphers and the Data Encryption Standard - Answer (click here)
15. Block Cipher Principles - Answer (click here)
16. The Data Encryption Standard - Answer (click here)
17. A DES(Data Encryption Standard) Example - Answer (click here)
18. The Strength of DES(Data Encryption Standard) - Answer (click here)
19. Differential and Linear Cryptanalysis - Answer (click here)
20. Block Cipher Design Principles - Answer (click here)
21. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
22. Divisibility and the Division Algorithm - Answer (click here)
23. The Euclidean Algorithm - Answer (click here)
24. Modular Arithmetic - Answer (click here)
25. Groups, Rings, and Fields - Answer (click here)
26. Finite Fields Of The Form GF(p) - Answer (click here)
27. Polynomial Arithmetic - Answer (click here)
28. Finite Fields of the Form GF(2n) - Answer (click here)
29. Advanced Encryption Standard(AES) - Answer (click here)
30. Finite Field Arithmetic - Answer (click here)
31. AES(Advanced Encryption Standard) Structure - Answer (click here)
32. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
33. AES Key Expansion - Answer (click here)
34. An Advanced Encryption Standard(AES) Example - Answer (click here)
35. AES(Advanced Encryption Standard) Implementation - Answer (click here)
36. Block Cipher Operation - Answer (click here)
37. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
38. Electronic Code Book - Answer (click here)
39. Cipher Block Chaining(CBC) Mode - Answer (click here)
40. Cipher Feedback Mode - Answer (click here)
41. Output Feedback Mode - Answer (click here)
42. Counter Mode - Answer (click here)
43. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
44. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
45. Principles of Pseudorandom Number Generation - Answer (click here)
46. Pseudorandom Number Generators - Answer (click here)
47. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
48. Stream Ciphers - Answer (click here)
49. RC4 - Answer (click here)
50. True Random Number Generators - Answer (click here)
51. Introduction to Number Theory - Answer (click here)
52. Prime Numbers - Answer (click here)
53. Fermat’s And Euler’s Theorems - Answer (click here)
54. Testing for Primality - Answer (click here)
55. The Chinese Remainder Theorem - Answer (click here)
56. Discrete Logarithms - Answer (click here)
57. Public-Key Cryptography and RSA - Answer (click here)
58. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
59. The RSA Algorithm - Answer (click here)
60. Description of the RSA Algorithm - Answer (click here)
61. The Security of RSA - Answer (click here)
62. Other Public-Key Cryptosystems - Answer (click here)
63. Diffie-Hellman Key Exchange - Answer (click here)
64. Elgamal Cryptographic System - Answer (click here)
65. Elliptic Curve Arithmetic - Answer (click here)
66. Elliptic Curve Cryptography - Answer (click here)
67. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
68. Cryptographic Hash Functions - Answer (click here)
69. Applications of Cryptographic Hash Functions - Answer (click here)
70. Two Simple Hash Functions - Answer (click here)
71. Requirements and Security - Answer (click here)
72. Hash Functions Based on Cipher Block Chaining - Answer (click here)
73. Secure Hash Algorithm (SHA) - Answer (click here)
74. SHA-3 - Answer (click here)

Chapter 12 Message Authentication Codes


1. Concepts and Definition of Computer Security - Answer (click here)
2. The Challenges of Computer Security - Answer (click here)
3. The OSI Security Architecture - Answer (click here)
4. Security Attacks: Passive and Active Attacks - Answer (click here)
5. Security Services - Answer (click here)
6. Security Mechanisms - Answer (click here)
7. A Model For Network Security - Answer (click here)
8. Classical Encryption Techniques - Answer (click here)
9. Symmetric Cipher Model - Answer (click here)
10. Substitution Techniques - Answer (click here)
11. Transposition Techniques - Answer (click here)
12. Rotor Machines - Answer (click here)
13. Steganography - Answer (click here)
14. Block Ciphers and the Data Encryption Standard - Answer (click here)
15. Block Cipher Principles - Answer (click here)
16. The Data Encryption Standard - Answer (click here)
17. A DES(Data Encryption Standard) Example - Answer (click here)
18. The Strength of DES(Data Encryption Standard) - Answer (click here)
19. Differential and Linear Cryptanalysis - Answer (click here)
20. Block Cipher Design Principles - Answer (click here)
21. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
22. Divisibility and the Division Algorithm - Answer (click here)
23. The Euclidean Algorithm - Answer (click here)
24. Modular Arithmetic - Answer (click here)
25. Groups, Rings, and Fields - Answer (click here)
26. Finite Fields Of The Form GF(p) - Answer (click here)
27. Polynomial Arithmetic - Answer (click here)
28. Finite Fields of the Form GF(2n) - Answer (click here)
29. Advanced Encryption Standard(AES) - Answer (click here)
30. Finite Field Arithmetic - Answer (click here)
31. AES(Advanced Encryption Standard) Structure - Answer (click here)
32. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
33. AES Key Expansion - Answer (click here)
34. An Advanced Encryption Standard(AES) Example - Answer (click here)
35. AES(Advanced Encryption Standard) Implementation - Answer (click here)
36. Block Cipher Operation - Answer (click here)
37. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
38. Electronic Code Book - Answer (click here)
39. Cipher Block Chaining(CBC) Mode - Answer (click here)
40. Cipher Feedback Mode - Answer (click here)
41. Output Feedback Mode - Answer (click here)
42. Counter Mode - Answer (click here)
43. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
44. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
45. Principles of Pseudorandom Number Generation - Answer (click here)
46. Pseudorandom Number Generators - Answer (click here)
47. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
48. Stream Ciphers - Answer (click here)
49. RC4 - Answer (click here)
50. True Random Number Generators - Answer (click here)
51. Introduction to Number Theory - Answer (click here)
52. Prime Numbers - Answer (click here)
53. Fermat’s And Euler’s Theorems - Answer (click here)
54. Testing for Primality - Answer (click here)
55. The Chinese Remainder Theorem - Answer (click here)
56. Discrete Logarithms - Answer (click here)
57. Public-Key Cryptography and RSA - Answer (click here)
58. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
59. The RSA Algorithm - Answer (click here)
60. Description of the RSA Algorithm - Answer (click here)
61. The Security of RSA - Answer (click here)
62. Other Public-Key Cryptosystems - Answer (click here)
63. Diffie-Hellman Key Exchange - Answer (click here)
64. Elgamal Cryptographic System - Answer (click here)
65. Elliptic Curve Arithmetic - Answer (click here)
66. Elliptic Curve Cryptography - Answer (click here)
67. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
68. Cryptographic Hash Functions - Answer (click here)
69. Applications of Cryptographic Hash Functions - Answer (click here)
70. Two Simple Hash Functions - Answer (click here)
71. Requirements and Security - Answer (click here)
72. Hash Functions Based on Cipher Block Chaining - Answer (click here)
73. Secure Hash Algorithm (SHA) - Answer (click here)
74. SHA-3 - Answer (click here)
75. Message Authentication Codes - Answer (click here)
76. Message Authentication Requirements - Answer (click here)
77. Message Authentication Functions - Answer (click here)
78. Requirements For Message Authentication Codes - Answer (click here)
79. Security of MACS - Answer (click here)
80. MACS Based on Hash Functions: HMAC - Answer (click here)
81. MACS Based on Block Ciphers: DAA And CMAC - Answer (click here)
82. Authenticated Encryption: CCM and GCM - Answer (click here)
83. Pseudorandom Number Generation Using Hash Functions and MACS -
Answer (click here)

Chapter 13 Digital Signatures


1. Concepts and Definition of Computer Security - Answer (click here)
2. The Challenges of Computer Security - Answer (click here)
3. The OSI Security Architecture - Answer (click here)
4. Security Attacks: Passive and Active Attacks - Answer (click here)
5. Security Services - Answer (click here)
6. Security Mechanisms - Answer (click here)
7. A Model For Network Security - Answer (click here)
8. Classical Encryption Techniques - Answer (click here)
9. Symmetric Cipher Model - Answer (click here)
10. Substitution Techniques - Answer (click here)
11. Transposition Techniques - Answer (click here)
12. Rotor Machines - Answer (click here)
13. Steganography - Answer (click here)
14. Block Ciphers and the Data Encryption Standard - Answer (click here)
15. Block Cipher Principles - Answer (click here)
16. The Data Encryption Standard - Answer (click here)
17. A DES(Data Encryption Standard) Example - Answer (click here)
18. The Strength of DES(Data Encryption Standard) - Answer (click here)
19. Differential and Linear Cryptanalysis - Answer (click here)
20. Block Cipher Design Principles - Answer (click here)
21. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
22. Divisibility and the Division Algorithm - Answer (click here)
23. The Euclidean Algorithm - Answer (click here)
24. Modular Arithmetic - Answer (click here)
25. Groups, Rings, and Fields - Answer (click here)
26. Finite Fields Of The Form GF(p) - Answer (click here)
27. Polynomial Arithmetic - Answer (click here)
28. Finite Fields of the Form GF(2n) - Answer (click here)
29. Advanced Encryption Standard(AES) - Answer (click here)
30. Finite Field Arithmetic - Answer (click here)
31. AES(Advanced Encryption Standard) Structure - Answer (click here)
32. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
33. AES Key Expansion - Answer (click here)
34. An Advanced Encryption Standard(AES) Example - Answer (click here)
35. AES(Advanced Encryption Standard) Implementation - Answer (click here)
36. Block Cipher Operation - Answer (click here)
37. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
38. Electronic Code Book - Answer (click here)
39. Cipher Block Chaining(CBC) Mode - Answer (click here)
40. Cipher Feedback Mode - Answer (click here)
41. Output Feedback Mode - Answer (click here)
42. Counter Mode - Answer (click here)
43. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
44. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
45. Principles of Pseudorandom Number Generation - Answer (click here)
46. Pseudorandom Number Generators - Answer (click here)
47. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
48. Stream Ciphers - Answer (click here)
49. RC4 - Answer (click here)
50. True Random Number Generators - Answer (click here)
51. Introduction to Number Theory - Answer (click here)
52. Prime Numbers - Answer (click here)
53. Fermat’s And Euler’s Theorems - Answer (click here)
54. Testing for Primality - Answer (click here)
55. The Chinese Remainder Theorem - Answer (click here)
56. Discrete Logarithms - Answer (click here)
57. Public-Key Cryptography and RSA - Answer (click here)
58. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
59. The RSA Algorithm - Answer (click here)
60. Description of the RSA Algorithm - Answer (click here)
61. The Security of RSA - Answer (click here)
62. Other Public-Key Cryptosystems - Answer (click here)
63. Diffie-Hellman Key Exchange - Answer (click here)
64. Elgamal Cryptographic System - Answer (click here)
65. Elliptic Curve Arithmetic - Answer (click here)
66. Elliptic Curve Cryptography - Answer (click here)
67. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
68. Cryptographic Hash Functions - Answer (click here)
69. Applications of Cryptographic Hash Functions - Answer (click here)
70. Two Simple Hash Functions - Answer (click here)
71. Requirements and Security - Answer (click here)
72. Hash Functions Based on Cipher Block Chaining - Answer (click here)
73. Secure Hash Algorithm (SHA) - Answer (click here)
74. SHA-3 - Answer (click here)
75. Message Authentication Codes - Answer (click here)
76. Message Authentication Requirements - Answer (click here)
77. Message Authentication Functions - Answer (click here)
78. Requirements For Message Authentication Codes - Answer (click here)
79. Security of MACS - Answer (click here)
80. MACS Based on Hash Functions: HMAC - Answer (click here)
81. MACS Based on Block Ciphers: DAA And CMAC - Answer (click here)
82. Authenticated Encryption: CCM and GCM - Answer (click here)
83. Pseudorandom Number Generation Using Hash Functions and MACS -
Answer (click here)
84. Digital Signatures - Answer (click here)
85. Digital Signatures: Properties, Attacks and Forgeries - Answer (click here)
86. ELGAMAL Digital Signature Scheme - Answer (click here)
87. Schnorr Digital Signature Scheme - Answer (click here)
88. Digital Signature Standard - Answer (click here)

PART FOUR MUTUAL TRUST


Chapter 14 Key Management and Distribution
1. Concepts and Definition of Computer Security - Answer (click here)
2. The Challenges of Computer Security - Answer (click here)
3. The OSI Security Architecture - Answer (click here)
4. Security Attacks: Passive and Active Attacks - Answer (click here)
5. Security Services - Answer (click here)
6. Security Mechanisms - Answer (click here)
7. A Model For Network Security - Answer (click here)
8. Classical Encryption Techniques - Answer (click here)
9. Symmetric Cipher Model - Answer (click here)
10. Substitution Techniques - Answer (click here)
11. Transposition Techniques - Answer (click here)
12. Rotor Machines - Answer (click here)
13. Steganography - Answer (click here)
14. Block Ciphers and the Data Encryption Standard - Answer (click here)
15. Block Cipher Principles - Answer (click here)
16. The Data Encryption Standard - Answer (click here)
17. A DES(Data Encryption Standard) Example - Answer (click here)
18. The Strength of DES(Data Encryption Standard) - Answer (click here)
19. Differential and Linear Cryptanalysis - Answer (click here)
20. Block Cipher Design Principles - Answer (click here)
21. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
22. Divisibility and the Division Algorithm - Answer (click here)
23. The Euclidean Algorithm - Answer (click here)
24. Modular Arithmetic - Answer (click here)
25. Groups, Rings, and Fields - Answer (click here)
26. Finite Fields Of The Form GF(p) - Answer (click here)
27. Polynomial Arithmetic - Answer (click here)
28. Finite Fields of the Form GF(2n) - Answer (click here)
29. Advanced Encryption Standard(AES) - Answer (click here)
30. Finite Field Arithmetic - Answer (click here)
31. AES(Advanced Encryption Standard) Structure - Answer (click here)
32. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
33. AES Key Expansion - Answer (click here)
34. An Advanced Encryption Standard(AES) Example - Answer (click here)
35. AES(Advanced Encryption Standard) Implementation - Answer (click here)
36. Block Cipher Operation - Answer (click here)
37. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
38. Electronic Code Book - Answer (click here)
39. Cipher Block Chaining(CBC) Mode - Answer (click here)
40. Cipher Feedback Mode - Answer (click here)
41. Output Feedback Mode - Answer (click here)
42. Counter Mode - Answer (click here)
43. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
44. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
45. Principles of Pseudorandom Number Generation - Answer (click here)
46. Pseudorandom Number Generators - Answer (click here)
47. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
48. Stream Ciphers - Answer (click here)
49. RC4 - Answer (click here)
50. True Random Number Generators - Answer (click here)
51. Introduction to Number Theory - Answer (click here)
52. Prime Numbers - Answer (click here)
53. Fermat’s And Euler’s Theorems - Answer (click here)
54. Testing for Primality - Answer (click here)
55. The Chinese Remainder Theorem - Answer (click here)
56. Discrete Logarithms - Answer (click here)
57. Public-Key Cryptography and RSA - Answer (click here)
58. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
59. The RSA Algorithm - Answer (click here)
60. Description of the RSA Algorithm - Answer (click here)
61. The Security of RSA - Answer (click here)
62. Other Public-Key Cryptosystems - Answer (click here)
63. Diffie-Hellman Key Exchange - Answer (click here)
64. Elgamal Cryptographic System - Answer (click here)
65. Elliptic Curve Arithmetic - Answer (click here)
66. Elliptic Curve Cryptography - Answer (click here)
67. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
68. Cryptographic Hash Functions - Answer (click here)
69. Applications of Cryptographic Hash Functions - Answer (click here)
70. Two Simple Hash Functions - Answer (click here)
71. Requirements and Security - Answer (click here)
72. Hash Functions Based on Cipher Block Chaining - Answer (click here)
73. Secure Hash Algorithm (SHA) - Answer (click here)
74. SHA-3 - Answer (click here)
75. Message Authentication Codes - Answer (click here)
76. Message Authentication Requirements - Answer (click here)
77. Message Authentication Functions - Answer (click here)
78. Requirements For Message Authentication Codes - Answer (click here)
79. Security of MACS - Answer (click here)
80. MACS Based on Hash Functions: HMAC - Answer (click here)
81. MACS Based on Block Ciphers: DAA And CMAC - Answer (click here)
82. Authenticated Encryption: CCM and GCM - Answer (click here)
83. Pseudorandom Number Generation Using Hash Functions and MACS -
Answer (click here)
84. Digital Signatures - Answer (click here)
85. Digital Signatures: Properties, Attacks and Forgeries - Answer (click here)
86. ELGAMAL Digital Signature Scheme - Answer (click here)
87. Schnorr Digital Signature Scheme - Answer (click here)
88. Digital Signature Standard - Answer (click here)
89. Key Management and Distribution - Answer (click here)
90. Symmetric Key Distribution Using Symmetric Encryption - Answer (click
here)
91. Symmetric Key Distribution Using Asymmetric Encryption - Answer
(click here)
92. Distribution of Public Keys - Answer (click here)
93. X.509 Certificates - Answer (click here)
94. Public-Key Infrastructure - Answer (click here)

Chapter 15 User Authentication Protocols


1. Concepts and Definition of Computer Security - Answer (click here)
2. The Challenges of Computer Security - Answer (click here)
3. The OSI Security Architecture - Answer (click here)
4. Security Attacks: Passive and Active Attacks - Answer (click here)
5. Security Services - Answer (click here)
6. Security Mechanisms - Answer (click here)
7. A Model For Network Security - Answer (click here)
8. Classical Encryption Techniques - Answer (click here)
9. Symmetric Cipher Model - Answer (click here)
10. Substitution Techniques - Answer (click here)
11. Transposition Techniques - Answer (click here)
12. Rotor Machines - Answer (click here)
13. Steganography - Answer (click here)
14. Block Ciphers and the Data Encryption Standard - Answer (click here)
15. Block Cipher Principles - Answer (click here)
16. The Data Encryption Standard - Answer (click here)
17. A DES(Data Encryption Standard) Example - Answer (click here)
18. The Strength of DES(Data Encryption Standard) - Answer (click here)
19. Differential and Linear Cryptanalysis - Answer (click here)
20. Block Cipher Design Principles - Answer (click here)
21. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
22. Divisibility and the Division Algorithm - Answer (click here)
23. The Euclidean Algorithm - Answer (click here)
24. Modular Arithmetic - Answer (click here)
25. Groups, Rings, and Fields - Answer (click here)
26. Finite Fields Of The Form GF(p) - Answer (click here)
27. Polynomial Arithmetic - Answer (click here)
28. Finite Fields of the Form GF(2n) - Answer (click here)
29. Advanced Encryption Standard(AES) - Answer (click here)
30. Finite Field Arithmetic - Answer (click here)
31. AES(Advanced Encryption Standard) Structure - Answer (click here)
32. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
33. AES Key Expansion - Answer (click here)
34. An Advanced Encryption Standard(AES) Example - Answer (click here)
35. AES(Advanced Encryption Standard) Implementation - Answer (click here)
36. Block Cipher Operation - Answer (click here)
37. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
38. Electronic Code Book - Answer (click here)
39. Cipher Block Chaining(CBC) Mode - Answer (click here)
40. Cipher Feedback Mode - Answer (click here)
41. Output Feedback Mode - Answer (click here)
42. Counter Mode - Answer (click here)
43. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
44. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
45. Principles of Pseudorandom Number Generation - Answer (click here)
46. Pseudorandom Number Generators - Answer (click here)
47. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
48. Stream Ciphers - Answer (click here)
49. RC4 - Answer (click here)
50. True Random Number Generators - Answer (click here)
51. Introduction to Number Theory - Answer (click here)
52. Prime Numbers - Answer (click here)
53. Fermat’s And Euler’s Theorems - Answer (click here)
54. Testing for Primality - Answer (click here)
55. The Chinese Remainder Theorem - Answer (click here)
56. Discrete Logarithms - Answer (click here)
57. Public-Key Cryptography and RSA - Answer (click here)
58. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
59. The RSA Algorithm - Answer (click here)
60. Description of the RSA Algorithm - Answer (click here)
61. The Security of RSA - Answer (click here)
62. Other Public-Key Cryptosystems - Answer (click here)
63. Diffie-Hellman Key Exchange - Answer (click here)
64. Elgamal Cryptographic System - Answer (click here)
65. Elliptic Curve Arithmetic - Answer (click here)
66. Elliptic Curve Cryptography - Answer (click here)
67. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
68. Cryptographic Hash Functions - Answer (click here)
69. Applications of Cryptographic Hash Functions - Answer (click here)
70. Two Simple Hash Functions - Answer (click here)
71. Requirements and Security - Answer (click here)
72. Hash Functions Based on Cipher Block Chaining - Answer (click here)
73. Secure Hash Algorithm (SHA) - Answer (click here)
74. SHA-3 - Answer (click here)
75. Message Authentication Codes - Answer (click here)
76. Message Authentication Requirements - Answer (click here)
77. Message Authentication Functions - Answer (click here)
78. Requirements For Message Authentication Codes - Answer (click here)
79. Security of MACS - Answer (click here)
80. MACS Based on Hash Functions: HMAC - Answer (click here)
81. MACS Based on Block Ciphers: DAA And CMAC - Answer (click here)
82. Authenticated Encryption: CCM and GCM - Answer (click here)
83. Pseudorandom Number Generation Using Hash Functions and MACS -
Answer (click here)
84. Digital Signatures - Answer (click here)
85. Digital Signatures: Properties, Attacks and Forgeries - Answer (click here)
86. ELGAMAL Digital Signature Scheme - Answer (click here)
87. Schnorr Digital Signature Scheme - Answer (click here)
88. Digital Signature Standard - Answer (click here)
89. Key Management and Distribution - Answer (click here)
90. Symmetric Key Distribution Using Symmetric Encryption - Answer (click
here)
91. Symmetric Key Distribution Using Asymmetric Encryption - Answer
(click here)
92. Distribution of Public Keys - Answer (click here)
93. X.509 Certificates - Answer (click here)
94. Public-Key Infrastructure - Answer (click here)
95. User Authentication - Answer (click here)
96. Remote User-Authentication Principles - Answer (click here)
97. Remote User-Authentication Using Symmetric Encryption - Answer (click
here)
98. Kerberos - Answer (click here)
99. Remote User Authentication Using Asymmetric Encryption - Answer
(click here)
100. Federated Identity Management - Answer (click here)

PART FIVE NETWORK AND INTERNET SECURITY


Chapter 16 Transport Level Security
1. Concepts and Definition of Computer Security - Answer (click here)
2. The Challenges of Computer Security - Answer (click here)
3. The OSI Security Architecture - Answer (click here)
4. Security Attacks: Passive and Active Attacks - Answer (click here)
5. Security Services - Answer (click here)
6. Security Mechanisms - Answer (click here)
7. A Model For Network Security - Answer (click here)
8. Classical Encryption Techniques - Answer (click here)
9. Symmetric Cipher Model - Answer (click here)
10. Substitution Techniques - Answer (click here)
11. Transposition Techniques - Answer (click here)
12. Rotor Machines - Answer (click here)
13. Steganography - Answer (click here)
14. Block Ciphers and the Data Encryption Standard - Answer (click here)
15. Block Cipher Principles - Answer (click here)
16. The Data Encryption Standard - Answer (click here)
17. A DES(Data Encryption Standard) Example - Answer (click here)
18. The Strength of DES(Data Encryption Standard) - Answer (click here)
19. Differential and Linear Cryptanalysis - Answer (click here)
20. Block Cipher Design Principles - Answer (click here)
21. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
22. Divisibility and the Division Algorithm - Answer (click here)
23. The Euclidean Algorithm - Answer (click here)
24. Modular Arithmetic - Answer (click here)
25. Groups, Rings, and Fields - Answer (click here)
26. Finite Fields Of The Form GF(p) - Answer (click here)
27. Polynomial Arithmetic - Answer (click here)
28. Finite Fields of the Form GF(2n) - Answer (click here)
29. Advanced Encryption Standard(AES) - Answer (click here)
30. Finite Field Arithmetic - Answer (click here)
31. AES(Advanced Encryption Standard) Structure - Answer (click here)
32. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
33. AES Key Expansion - Answer (click here)
34. An Advanced Encryption Standard(AES) Example - Answer (click here)
35. AES(Advanced Encryption Standard) Implementation - Answer (click here)
36. Block Cipher Operation - Answer (click here)
37. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
38. Electronic Code Book - Answer (click here)
39. Cipher Block Chaining(CBC) Mode - Answer (click here)
40. Cipher Feedback Mode - Answer (click here)
41. Output Feedback Mode - Answer (click here)
42. Counter Mode - Answer (click here)
43. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
44. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
45. Principles of Pseudorandom Number Generation - Answer (click here)
46. Pseudorandom Number Generators - Answer (click here)
47. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
48. Stream Ciphers - Answer (click here)
49. RC4 - Answer (click here)
50. True Random Number Generators - Answer (click here)
51. Introduction to Number Theory - Answer (click here)
52. Prime Numbers - Answer (click here)
53. Fermat’s And Euler’s Theorems - Answer (click here)
54. Testing for Primality - Answer (click here)
55. The Chinese Remainder Theorem - Answer (click here)
56. Discrete Logarithms - Answer (click here)
57. Public-Key Cryptography and RSA - Answer (click here)
58. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
59. The RSA Algorithm - Answer (click here)
60. Description of the RSA Algorithm - Answer (click here)
61. The Security of RSA - Answer (click here)
62. Other Public-Key Cryptosystems - Answer (click here)
63. Diffie-Hellman Key Exchange - Answer (click here)
64. Elgamal Cryptographic System - Answer (click here)
65. Elliptic Curve Arithmetic - Answer (click here)
66. Elliptic Curve Cryptography - Answer (click here)
67. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
68. Cryptographic Hash Functions - Answer (click here)
69. Applications of Cryptographic Hash Functions - Answer (click here)
70. Two Simple Hash Functions - Answer (click here)
71. Requirements and Security - Answer (click here)
72. Hash Functions Based on Cipher Block Chaining - Answer (click here)
73. Secure Hash Algorithm (SHA) - Answer (click here)
74. SHA-3 - Answer (click here)
75. Message Authentication Codes - Answer (click here)
76. Message Authentication Requirements - Answer (click here)
77. Message Authentication Functions - Answer (click here)
78. Requirements For Message Authentication Codes - Answer (click here)
79. Security of MACS - Answer (click here)
80. MACS Based on Hash Functions: HMAC - Answer (click here)
81. MACS Based on Block Ciphers: DAA And CMAC - Answer (click here)
82. Authenticated Encryption: CCM and GCM - Answer (click here)
83. Pseudorandom Number Generation Using Hash Functions and MACS -
Answer (click here)
84. Digital Signatures - Answer (click here)
85. Digital Signatures: Properties, Attacks and Forgeries - Answer (click here)
86. ELGAMAL Digital Signature Scheme - Answer (click here)
87. Schnorr Digital Signature Scheme - Answer (click here)
88. Digital Signature Standard - Answer (click here)
89. Key Management and Distribution - Answer (click here)
90. Symmetric Key Distribution Using Symmetric Encryption - Answer (click
here)
91. Symmetric Key Distribution Using Asymmetric Encryption - Answer
(click here)
92. Distribution of Public Keys - Answer (click here)
93. X.509 Certificates - Answer (click here)
94. Public-Key Infrastructure - Answer (click here)
95. User Authentication - Answer (click here)
96. Remote User-Authentication Principles - Answer (click here)
97. Remote User-Authentication Using Symmetric Encryption - Answer (click
here)
98. Kerberos - Answer (click here)
99. Remote User Authentication Using Asymmetric Encryption - Answer
(click here)
100. Federated Identity Management - Answer (click here)
101. Transport-Level Security - Answer (click here)
102. Web Security Considerations - Answer (click here)
103. Secure Socket Layer and Transport Layer Security - Answer (click here)
104. Transport Layer Security - Answer (click here)
105. HTTPS - Answer (click here)
106. Secure Shell (SSH) - Answer (click here)

Chapter 17 Wireless Network Security


1. Concepts and Definition of Computer Security - Answer (click here)
2. The Challenges of Computer Security - Answer (click here)
3. The OSI Security Architecture - Answer (click here)
4. Security Attacks: Passive and Active Attacks - Answer (click here)
5. Security Services - Answer (click here)
6. Security Mechanisms - Answer (click here)
7. A Model For Network Security - Answer (click here)
8. Classical Encryption Techniques - Answer (click here)
9. Symmetric Cipher Model - Answer (click here)
10. Substitution Techniques - Answer (click here)
11. Transposition Techniques - Answer (click here)
12. Rotor Machines - Answer (click here)
13. Steganography - Answer (click here)
14. Block Ciphers and the Data Encryption Standard - Answer (click here)
15. Block Cipher Principles - Answer (click here)
16. The Data Encryption Standard - Answer (click here)
17. A DES(Data Encryption Standard) Example - Answer (click here)
18. The Strength of DES(Data Encryption Standard) - Answer (click here)
19. Differential and Linear Cryptanalysis - Answer (click here)
20. Block Cipher Design Principles - Answer (click here)
21. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
22. Divisibility and the Division Algorithm - Answer (click here)
23. The Euclidean Algorithm - Answer (click here)
24. Modular Arithmetic - Answer (click here)
25. Groups, Rings, and Fields - Answer (click here)
26. Finite Fields Of The Form GF(p) - Answer (click here)
27. Polynomial Arithmetic - Answer (click here)
28. Finite Fields of the Form GF(2n) - Answer (click here)
29. Advanced Encryption Standard(AES) - Answer (click here)
30. Finite Field Arithmetic - Answer (click here)
31. AES(Advanced Encryption Standard) Structure - Answer (click here)
32. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
33. AES Key Expansion - Answer (click here)
34. An Advanced Encryption Standard(AES) Example - Answer (click here)
35. AES(Advanced Encryption Standard) Implementation - Answer (click here)
36. Block Cipher Operation - Answer (click here)
37. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
38. Electronic Code Book - Answer (click here)
39. Cipher Block Chaining(CBC) Mode - Answer (click here)
40. Cipher Feedback Mode - Answer (click here)
41. Output Feedback Mode - Answer (click here)
42. Counter Mode - Answer (click here)
43. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
44. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
45. Principles of Pseudorandom Number Generation - Answer (click here)
46. Pseudorandom Number Generators - Answer (click here)
47. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
48. Stream Ciphers - Answer (click here)
49. RC4 - Answer (click here)
50. True Random Number Generators - Answer (click here)
51. Introduction to Number Theory - Answer (click here)
52. Prime Numbers - Answer (click here)
53. Fermat’s And Euler’s Theorems - Answer (click here)
54. Testing for Primality - Answer (click here)
55. The Chinese Remainder Theorem - Answer (click here)
56. Discrete Logarithms - Answer (click here)
57. Public-Key Cryptography and RSA - Answer (click here)
58. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
59. The RSA Algorithm - Answer (click here)
60. Description of the RSA Algorithm - Answer (click here)
61. The Security of RSA - Answer (click here)
62. Other Public-Key Cryptosystems - Answer (click here)
63. Diffie-Hellman Key Exchange - Answer (click here)
64. Elgamal Cryptographic System - Answer (click here)
65. Elliptic Curve Arithmetic - Answer (click here)
66. Elliptic Curve Cryptography - Answer (click here)
67. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
68. Cryptographic Hash Functions - Answer (click here)
69. Applications of Cryptographic Hash Functions - Answer (click here)
70. Two Simple Hash Functions - Answer (click here)
71. Requirements and Security - Answer (click here)
72. Hash Functions Based on Cipher Block Chaining - Answer (click here)
73. Secure Hash Algorithm (SHA) - Answer (click here)
74. SHA-3 - Answer (click here)
75. Message Authentication Codes - Answer (click here)
76. Message Authentication Requirements - Answer (click here)
77. Message Authentication Functions - Answer (click here)
78. Requirements For Message Authentication Codes - Answer (click here)
79. Security of MACS - Answer (click here)
80. MACS Based on Hash Functions: HMAC - Answer (click here)
81. MACS Based on Block Ciphers: DAA And CMAC - Answer (click here)
82. Authenticated Encryption: CCM and GCM - Answer (click here)
83. Pseudorandom Number Generation Using Hash Functions and MACS -
Answer (click here)
84. Digital Signatures - Answer (click here)
85. Digital Signatures: Properties, Attacks and Forgeries - Answer (click here)
86. ELGAMAL Digital Signature Scheme - Answer (click here)
87. Schnorr Digital Signature Scheme - Answer (click here)
88. Digital Signature Standard - Answer (click here)
89. Key Management and Distribution - Answer (click here)
90. Symmetric Key Distribution Using Symmetric Encryption - Answer (click
here)
91. Symmetric Key Distribution Using Asymmetric Encryption - Answer
(click here)
92. Distribution of Public Keys - Answer (click here)
93. X.509 Certificates - Answer (click here)
94. Public-Key Infrastructure - Answer (click here)
95. User Authentication - Answer (click here)
96. Remote User-Authentication Principles - Answer (click here)
97. Remote User-Authentication Using Symmetric Encryption - Answer (click
here)
98. Kerberos - Answer (click here)
99. Remote User Authentication Using Asymmetric Encryption - Answer
(click here)
100. Federated Identity Management - Answer (click here)
101. Transport-Level Security - Answer (click here)
102. Web Security Considerations - Answer (click here)
103. Secure Socket Layer and Transport Layer Security - Answer (click here)
104. Transport Layer Security - Answer (click here)
105. HTTPS - Answer (click here)
106. Secure Shell (SSH) - Answer (click here)
1. Concepts and Definition of Computer Security - Answer (click here)
2. The Challenges of Computer Security - Answer (click here)
3. The OSI Security Architecture - Answer (click here)
4. Security Attacks: Passive and Active Attacks - Answer (click here)
5. Security Services - Answer (click here)
6. Security Mechanisms - Answer (click here)
7. A Model For Network Security - Answer (click here)
8. Classical Encryption Techniques - Answer (click here)
9. Symmetric Cipher Model - Answer (click here)
10. Substitution Techniques - Answer (click here)
11. Transposition Techniques - Answer (click here)
12. Rotor Machines - Answer (click here)
13. Steganography - Answer (click here)
14. Block Ciphers and the Data Encryption Standard - Answer (click here)
15. Block Cipher Principles - Answer (click here)
16. The Data Encryption Standard - Answer (click here)
17. A DES(Data Encryption Standard) Example - Answer (click here)
18. The Strength of DES(Data Encryption Standard) - Answer (click here)
19. Differential and Linear Cryptanalysis - Answer (click here)
20. Block Cipher Design Principles - Answer (click here)
21. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
22. Divisibility and the Division Algorithm - Answer (click here)
23. The Euclidean Algorithm - Answer (click here)
24. Modular Arithmetic - Answer (click here)
25. Groups, Rings, and Fields - Answer (click here)
26. Finite Fields Of The Form GF(p) - Answer (click here)
27. Polynomial Arithmetic - Answer (click here)
28. Finite Fields of the Form GF(2n) - Answer (click here)
29. Advanced Encryption Standard(AES) - Answer (click here)
30. Finite Field Arithmetic - Answer (click here)
31. AES(Advanced Encryption Standard) Structure - Answer (click here)
32. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
33. AES Key Expansion - Answer (click here)
34. An Advanced Encryption Standard(AES) Example - Answer (click here)
35. AES(Advanced Encryption Standard) Implementation - Answer (click here)
36. Block Cipher Operation - Answer (click here)
37. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
38. Electronic Code Book - Answer (click here)
39. Cipher Block Chaining(CBC) Mode - Answer (click here)
40. Cipher Feedback Mode - Answer (click here)
41. Output Feedback Mode - Answer (click here)
42. Counter Mode - Answer (click here)
43. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
44. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
45. Principles of Pseudorandom Number Generation - Answer (click here)
46. Pseudorandom Number Generators - Answer (click here)
47. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
48. Stream Ciphers - Answer (click here)
49. RC4 - Answer (click here)
50. True Random Number Generators - Answer (click here)
51. Introduction to Number Theory - Answer (click here)
52. Prime Numbers - Answer (click here)
53. Fermat’s And Euler’s Theorems - Answer (click here)
54. Testing for Primality - Answer (click here)
55. The Chinese Remainder Theorem - Answer (click here)
56. Discrete Logarithms - Answer (click here)
57. Public-Key Cryptography and RSA - Answer (click here)
58. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
59. The RSA Algorithm - Answer (click here)
60. Description of the RSA Algorithm - Answer (click here)
61. The Security of RSA - Answer (click here)
62. Other Public-Key Cryptosystems - Answer (click here)
63. Diffie-Hellman Key Exchange - Answer (click here)
64. Elgamal Cryptographic System - Answer (click here)
65. Elliptic Curve Arithmetic - Answer (click here)
66. Elliptic Curve Cryptography - Answer (click here)
67. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
68. Cryptographic Hash Functions - Answer (click here)
69. Applications of Cryptographic Hash Functions - Answer (click here)
70. Two Simple Hash Functions - Answer (click here)
71. Requirements and Security - Answer (click here)
72. Hash Functions Based on Cipher Block Chaining - Answer (click here)
73. Secure Hash Algorithm (SHA) - Answer (click here)
74. SHA-3 - Answer (click here)
75. Message Authentication Codes - Answer (click here)
76. Message Authentication Requirements - Answer (click here)
77. Message Authentication Functions - Answer (click here)
78. Requirements For Message Authentication Codes - Answer (click here)
79. Security of MACS - Answer (click here)
80. MACS Based on Hash Functions: HMAC - Answer (click here)
81. MACS Based on Block Ciphers: DAA And CMAC - Answer (click here)
82. Authenticated Encryption: CCM and GCM - Answer (click here)
83. Pseudorandom Number Generation Using Hash Functions and MACS -
Answer (click here)
84. Digital Signatures - Answer (click here)
85. Digital Signatures: Properties, Attacks and Forgeries - Answer (click here)
86. ELGAMAL Digital Signature Scheme - Answer (click here)
87. Schnorr Digital Signature Scheme - Answer (click here)
88. Digital Signature Standard - Answer (click here)
89. Key Management and Distribution - Answer (click here)
90. Symmetric Key Distribution Using Symmetric Encryption - Answer (click
here)
91. Symmetric Key Distribution Using Asymmetric Encryption - Answer
(click here)
92. Distribution of Public Keys - Answer (click here)
93. X.509 Certificates - Answer (click here)
94. Public-Key Infrastructure - Answer (click here)
95. User Authentication - Answer (click here)
96. Remote User-Authentication Principles - Answer (click here)
97. Remote User-Authentication Using Symmetric Encryption - Answer (click
here)
98. Kerberos - Answer (click here)
99. Remote User Authentication Using Asymmetric Encryption - Answer
(click here)
100. Federated Identity Management - Answer (click here)
101. Transport-Level Security - Answer (click here)
102. Web Security Considerations - Answer (click here)
103. Secure Socket Layer and Transport Layer Security - Answer (click here)
104. Transport Layer Security - Answer (click here)
105. HTTPS - Answer (click here)
106. Secure Shell (SSH) - Answer (click here)
107. Wireless Network Security - Answer (click here)
108. IEEE 802.11 Wireless LAN Overview: Wi-Fi Alliance, Protocol
Architecture, Network Components - Answer (click here)
109. IEEE 802.11i Wireless LAN Security - Answer (click here)
110. Wireless Application Protocol Overview - Answer (click here)
111. Wireless Transport Layer Security - Answer (click here)
112. WAP End-to-End Security - Answer (click here)

Chapter 18 Electronic Mail Security


1. Concepts and Definition of Computer Security - Answer (click here)
2. The Challenges of Computer Security - Answer (click here)
3. The OSI Security Architecture - Answer (click here)
4. Security Attacks: Passive and Active Attacks - Answer (click here)
5. Security Services - Answer (click here)
6. Security Mechanisms - Answer (click here)
7. A Model For Network Security - Answer (click here)
8. Classical Encryption Techniques - Answer (click here)
9. Symmetric Cipher Model - Answer (click here)
10. Substitution Techniques - Answer (click here)
11. Transposition Techniques - Answer (click here)
12. Rotor Machines - Answer (click here)
13. Steganography - Answer (click here)
14. Block Ciphers and the Data Encryption Standard - Answer (click here)
15. Block Cipher Principles - Answer (click here)
16. The Data Encryption Standard - Answer (click here)
17. A DES(Data Encryption Standard) Example - Answer (click here)
18. The Strength of DES(Data Encryption Standard) - Answer (click here)
19. Differential and Linear Cryptanalysis - Answer (click here)
20. Block Cipher Design Principles - Answer (click here)
21. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
22. Divisibility and the Division Algorithm - Answer (click here)
23. The Euclidean Algorithm - Answer (click here)
24. Modular Arithmetic - Answer (click here)
25. Groups, Rings, and Fields - Answer (click here)
26. Finite Fields Of The Form GF(p) - Answer (click here)
27. Polynomial Arithmetic - Answer (click here)
28. Finite Fields of the Form GF(2n) - Answer (click here)
29. Advanced Encryption Standard(AES) - Answer (click here)
30. Finite Field Arithmetic - Answer (click here)
31. AES(Advanced Encryption Standard) Structure - Answer (click here)
32. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
33. AES Key Expansion - Answer (click here)
34. An Advanced Encryption Standard(AES) Example - Answer (click here)
35. AES(Advanced Encryption Standard) Implementation - Answer (click here)
36. Block Cipher Operation - Answer (click here)
37. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
38. Electronic Code Book - Answer (click here)
39. Cipher Block Chaining(CBC) Mode - Answer (click here)
40. Cipher Feedback Mode - Answer (click here)
41. Output Feedback Mode - Answer (click here)
42. Counter Mode - Answer (click here)
43. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
44. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
45. Principles of Pseudorandom Number Generation - Answer (click here)
46. Pseudorandom Number Generators - Answer (click here)
47. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
48. Stream Ciphers - Answer (click here)
49. RC4 - Answer (click here)
50. True Random Number Generators - Answer (click here)
51. Introduction to Number Theory - Answer (click here)
52. Prime Numbers - Answer (click here)
53. Fermat’s And Euler’s Theorems - Answer (click here)
54. Testing for Primality - Answer (click here)
55. The Chinese Remainder Theorem - Answer (click here)
56. Discrete Logarithms - Answer (click here)
57. Public-Key Cryptography and RSA - Answer (click here)
58. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
59. The RSA Algorithm - Answer (click here)
60. Description of the RSA Algorithm - Answer (click here)
61. The Security of RSA - Answer (click here)
62. Other Public-Key Cryptosystems - Answer (click here)
63. Diffie-Hellman Key Exchange - Answer (click here)
64. Elgamal Cryptographic System - Answer (click here)
65. Elliptic Curve Arithmetic - Answer (click here)
66. Elliptic Curve Cryptography - Answer (click here)
67. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
68. Cryptographic Hash Functions - Answer (click here)
69. Applications of Cryptographic Hash Functions - Answer (click here)
70. Two Simple Hash Functions - Answer (click here)
71. Requirements and Security - Answer (click here)
72. Hash Functions Based on Cipher Block Chaining - Answer (click here)
73. Secure Hash Algorithm (SHA) - Answer (click here)
74. SHA-3 - Answer (click here)
75. Message Authentication Codes - Answer (click here)
76. Message Authentication Requirements - Answer (click here)
77. Message Authentication Functions - Answer (click here)
78. Requirements For Message Authentication Codes - Answer (click here)
79. Security of MACS - Answer (click here)
80. MACS Based on Hash Functions: HMAC - Answer (click here)
81. MACS Based on Block Ciphers: DAA And CMAC - Answer (click here)
82. Authenticated Encryption: CCM and GCM - Answer (click here)
83. Pseudorandom Number Generation Using Hash Functions and MACS -
Answer (click here)
84. Digital Signatures - Answer (click here)
85. Digital Signatures: Properties, Attacks and Forgeries - Answer (click here)
86. ELGAMAL Digital Signature Scheme - Answer (click here)
87. Schnorr Digital Signature Scheme - Answer (click here)
88. Digital Signature Standard - Answer (click here)
89. Key Management and Distribution - Answer (click here)
90. Symmetric Key Distribution Using Symmetric Encryption - Answer (click
here)
91. Symmetric Key Distribution Using Asymmetric Encryption - Answer
(click here)
92. Distribution of Public Keys - Answer (click here)
93. X.509 Certificates - Answer (click here)
94. Public-Key Infrastructure - Answer (click here)
95. User Authentication - Answer (click here)
96. Remote User-Authentication Principles - Answer (click here)
97. Remote User-Authentication Using Symmetric Encryption - Answer (click
here)
98. Kerberos - Answer (click here)
99. Remote User Authentication Using Asymmetric Encryption - Answer
(click here)
100. Federated Identity Management - Answer (click here)
101. Transport-Level Security - Answer (click here)
102. Web Security Considerations - Answer (click here)
103. Secure Socket Layer and Transport Layer Security - Answer (click here)
104. Transport Layer Security - Answer (click here)
105. HTTPS - Answer (click here)
106. Secure Shell (SSH) - Answer (click here)
107. Wireless Network Security - Answer (click here)
108. IEEE 802.11 Wireless LAN Overview: Wi-Fi Alliance, Protocol
Architecture, Network Components - Answer (click here)
109. IEEE 802.11i Wireless LAN Security - Answer (click here)
110. Wireless Application Protocol Overview - Answer (click here)
111. Wireless Transport Layer Security - Answer (click here)
112. WAP End-to-End Security - Answer (click here)
113. Electronic Mail Security - Answer (click here)
114. Pretty Good Privacy - Answer (click here)
115. S/MIME - Answer (click here)
116. DomainKeys Identified Mail - Answer (click here)

Chapter 19 IP Security
1. Concepts and Definition of Computer Security - Answer (click here)
2. The Challenges of Computer Security - Answer (click here)
3. The OSI Security Architecture - Answer (click here)
4. Security Attacks: Passive and Active Attacks - Answer (click here)
5. Security Services - Answer (click here)
6. Security Mechanisms - Answer (click here)
7. A Model For Network Security - Answer (click here)
8. Classical Encryption Techniques - Answer (click here)
9. Symmetric Cipher Model - Answer (click here)
10. Substitution Techniques - Answer (click here)
11. Transposition Techniques - Answer (click here)
12. Rotor Machines - Answer (click here)
13. Steganography - Answer (click here)
14. Block Ciphers and the Data Encryption Standard - Answer (click here)
15. Block Cipher Principles - Answer (click here)
16. The Data Encryption Standard - Answer (click here)
17. A DES(Data Encryption Standard) Example - Answer (click here)
18. The Strength of DES(Data Encryption Standard) - Answer (click here)
19. Differential and Linear Cryptanalysis - Answer (click here)
20. Block Cipher Design Principles - Answer (click here)
21. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
22. Divisibility and the Division Algorithm - Answer (click here)
23. The Euclidean Algorithm - Answer (click here)
24. Modular Arithmetic - Answer (click here)
25. Groups, Rings, and Fields - Answer (click here)
26. Finite Fields Of The Form GF(p) - Answer (click here)
27. Polynomial Arithmetic - Answer (click here)
28. Finite Fields of the Form GF(2n) - Answer (click here)
29. Advanced Encryption Standard(AES) - Answer (click here)
30. Finite Field Arithmetic - Answer (click here)
31. AES(Advanced Encryption Standard) Structure - Answer (click here)
32. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
33. AES Key Expansion - Answer (click here)
34. An Advanced Encryption Standard(AES) Example - Answer (click here)
35. AES(Advanced Encryption Standard) Implementation - Answer (click here)
36. Block Cipher Operation - Answer (click here)
37. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
38. Electronic Code Book - Answer (click here)
39. Cipher Block Chaining(CBC) Mode - Answer (click here)
40. Cipher Feedback Mode - Answer (click here)
41. Output Feedback Mode - Answer (click here)
42. Counter Mode - Answer (click here)
43. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
44. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
45. Principles of Pseudorandom Number Generation - Answer (click here)
46. Pseudorandom Number Generators - Answer (click here)
47. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
48. Stream Ciphers - Answer (click here)
49. RC4 - Answer (click here)
50. True Random Number Generators - Answer (click here)
51. Introduction to Number Theory - Answer (click here)
52. Prime Numbers - Answer (click here)
53. Fermat’s And Euler’s Theorems - Answer (click here)
54. Testing for Primality - Answer (click here)
55. The Chinese Remainder Theorem - Answer (click here)
56. Discrete Logarithms - Answer (click here)
57. Public-Key Cryptography and RSA - Answer (click here)
58. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
59. The RSA Algorithm - Answer (click here)
60. Description of the RSA Algorithm - Answer (click here)
61. The Security of RSA - Answer (click here)
62. Other Public-Key Cryptosystems - Answer (click here)
63. Diffie-Hellman Key Exchange - Answer (click here)
64. Elgamal Cryptographic System - Answer (click here)
65. Elliptic Curve Arithmetic - Answer (click here)
66. Elliptic Curve Cryptography - Answer (click here)
67. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
68. Cryptographic Hash Functions - Answer (click here)
69. Applications of Cryptographic Hash Functions - Answer (click here)
70. Two Simple Hash Functions - Answer (click here)
71. Requirements and Security - Answer (click here)
72. Hash Functions Based on Cipher Block Chaining - Answer (click here)
73. Secure Hash Algorithm (SHA) - Answer (click here)
74. SHA-3 - Answer (click here)
75. Message Authentication Codes - Answer (click here)
76. Message Authentication Requirements - Answer (click here)
77. Message Authentication Functions - Answer (click here)
78. Requirements For Message Authentication Codes - Answer (click here)
79. Security of MACS - Answer (click here)
80. MACS Based on Hash Functions: HMAC - Answer (click here)
81. MACS Based on Block Ciphers: DAA And CMAC - Answer (click here)
82. Authenticated Encryption: CCM and GCM - Answer (click here)
83. Pseudorandom Number Generation Using Hash Functions and MACS -
Answer (click here)
84. Digital Signatures - Answer (click here)
85. Digital Signatures: Properties, Attacks and Forgeries - Answer (click here)
86. ELGAMAL Digital Signature Scheme - Answer (click here)
87. Schnorr Digital Signature Scheme - Answer (click here)
88. Digital Signature Standard - Answer (click here)
89. Key Management and Distribution - Answer (click here)
90. Symmetric Key Distribution Using Symmetric Encryption - Answer (click
here)
91. Symmetric Key Distribution Using Asymmetric Encryption - Answer
(click here)
92. Distribution of Public Keys - Answer (click here)
93. X.509 Certificates - Answer (click here)
94. Public-Key Infrastructure - Answer (click here)
95. User Authentication - Answer (click here)
96. Remote User-Authentication Principles - Answer (click here)
97. Remote User-Authentication Using Symmetric Encryption - Answer (click
here)
98. Kerberos - Answer (click here)
99. Remote User Authentication Using Asymmetric Encryption - Answer
(click here)
100. Federated Identity Management - Answer (click here)
101. Transport-Level Security - Answer (click here)
102. Web Security Considerations - Answer (click here)
103. Secure Socket Layer and Transport Layer Security - Answer (click here)
104. Transport Layer Security - Answer (click here)
105. HTTPS - Answer (click here)
106. Secure Shell (SSH) - Answer (click here)
107. Wireless Network Security - Answer (click here)
108. IEEE 802.11 Wireless LAN Overview: Wi-Fi Alliance, Protocol
Architecture, Network Components - Answer (click here)
109. IEEE 802.11i Wireless LAN Security - Answer (click here)
110. Wireless Application Protocol Overview - Answer (click here)
111. Wireless Transport Layer Security - Answer (click here)
112. WAP End-to-End Security - Answer (click here)
113. Electronic Mail Security - Answer (click here)
114. Pretty Good Privacy - Answer (click here)
115. S/MIME - Answer (click here)
116. DomainKeys Identified Mail - Answer (click here)
117. IP Security(IPsec) - Answer (click here)
118. IP Security Overview - Answer (click here)
119. IP Security Policy - Answer (click here)
120. Encapsulating Security Payload - Answer (click here)
121. Combining Security Associations - Answer (click here)
122. Internet Key Exchange - Answer (click here)
123. Cryptographic Suites - Answer (click here)

PART SIX SYSTEM SECURITY


Chapter 20 Intruders
1. Concepts and Definition of Computer Security - Answer (click here)
2. The Challenges of Computer Security - Answer (click here)
3. The OSI Security Architecture - Answer (click here)
4. Security Attacks: Passive and Active Attacks - Answer (click here)
5. Security Services - Answer (click here)
6. Security Mechanisms - Answer (click here)
7. A Model For Network Security - Answer (click here)
8. Classical Encryption Techniques - Answer (click here)
9. Symmetric Cipher Model - Answer (click here)
10. Substitution Techniques - Answer (click here)
11. Transposition Techniques - Answer (click here)
12. Rotor Machines - Answer (click here)
13. Steganography - Answer (click here)
14. Block Ciphers and the Data Encryption Standard - Answer (click here)
15. Block Cipher Principles - Answer (click here)
16. The Data Encryption Standard - Answer (click here)
17. A DES(Data Encryption Standard) Example - Answer (click here)
18. The Strength of DES(Data Encryption Standard) - Answer (click here)
19. Differential and Linear Cryptanalysis - Answer (click here)
20. Block Cipher Design Principles - Answer (click here)
21. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
22. Divisibility and the Division Algorithm - Answer (click here)
23. The Euclidean Algorithm - Answer (click here)
24. Modular Arithmetic - Answer (click here)
25. Groups, Rings, and Fields - Answer (click here)
26. Finite Fields Of The Form GF(p) - Answer (click here)
27. Polynomial Arithmetic - Answer (click here)
28. Finite Fields of the Form GF(2n) - Answer (click here)
29. Advanced Encryption Standard(AES) - Answer (click here)
30. Finite Field Arithmetic - Answer (click here)
31. AES(Advanced Encryption Standard) Structure - Answer (click here)
32. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
33. AES Key Expansion - Answer (click here)
34. An Advanced Encryption Standard(AES) Example - Answer (click here)
35. AES(Advanced Encryption Standard) Implementation - Answer (click here)
36. Block Cipher Operation - Answer (click here)
37. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
38. Electronic Code Book - Answer (click here)
39. Cipher Block Chaining(CBC) Mode - Answer (click here)
40. Cipher Feedback Mode - Answer (click here)
41. Output Feedback Mode - Answer (click here)
42. Counter Mode - Answer (click here)
43. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
44. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
45. Principles of Pseudorandom Number Generation - Answer (click here)
46. Pseudorandom Number Generators - Answer (click here)
47. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
48. Stream Ciphers - Answer (click here)
49. RC4 - Answer (click here)
50. True Random Number Generators - Answer (click here)
51. Introduction to Number Theory - Answer (click here)
52. Prime Numbers - Answer (click here)
53. Fermat’s And Euler’s Theorems - Answer (click here)
54. Testing for Primality - Answer (click here)
55. The Chinese Remainder Theorem - Answer (click here)
56. Discrete Logarithms - Answer (click here)
57. Public-Key Cryptography and RSA - Answer (click here)
58. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
59. The RSA Algorithm - Answer (click here)
60. Description of the RSA Algorithm - Answer (click here)
61. The Security of RSA - Answer (click here)
62. Other Public-Key Cryptosystems - Answer (click here)
63. Diffie-Hellman Key Exchange - Answer (click here)
64. Elgamal Cryptographic System - Answer (click here)
65. Elliptic Curve Arithmetic - Answer (click here)
66. Elliptic Curve Cryptography - Answer (click here)
67. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
68. Cryptographic Hash Functions - Answer (click here)
69. Applications of Cryptographic Hash Functions - Answer (click here)
70. Two Simple Hash Functions - Answer (click here)
71. Requirements and Security - Answer (click here)
72. Hash Functions Based on Cipher Block Chaining - Answer (click here)
73. Secure Hash Algorithm (SHA) - Answer (click here)
74. SHA-3 - Answer (click here)
75. Message Authentication Codes - Answer (click here)
76. Message Authentication Requirements - Answer (click here)
77. Message Authentication Functions - Answer (click here)
78. Requirements For Message Authentication Codes - Answer (click here)
79. Security of MACS - Answer (click here)
80. MACS Based on Hash Functions: HMAC - Answer (click here)
81. MACS Based on Block Ciphers: DAA And CMAC - Answer (click here)
82. Authenticated Encryption: CCM and GCM - Answer (click here)
83. Pseudorandom Number Generation Using Hash Functions and MACS -
Answer (click here)
84. Digital Signatures - Answer (click here)
85. Digital Signatures: Properties, Attacks and Forgeries - Answer (click here)
86. ELGAMAL Digital Signature Scheme - Answer (click here)
87. Schnorr Digital Signature Scheme - Answer (click here)
88. Digital Signature Standard - Answer (click here)
89. Key Management and Distribution - Answer (click here)
90. Symmetric Key Distribution Using Symmetric Encryption - Answer (click
here)
91. Symmetric Key Distribution Using Asymmetric Encryption - Answer
(click here)
92. Distribution of Public Keys - Answer (click here)
93. X.509 Certificates - Answer (click here)
94. Public-Key Infrastructure - Answer (click here)
95. User Authentication - Answer (click here)
96. Remote User-Authentication Principles - Answer (click here)
97. Remote User-Authentication Using Symmetric Encryption - Answer (click
here)
98. Kerberos - Answer (click here)
99. Remote User Authentication Using Asymmetric Encryption - Answer
(click here)
100. Federated Identity Management - Answer (click here)
101. Transport-Level Security - Answer (click here)
102. Web Security Considerations - Answer (click here)
103. Secure Socket Layer and Transport Layer Security - Answer (click here)
104. Transport Layer Security - Answer (click here)
105. HTTPS - Answer (click here)
106. Secure Shell (SSH) - Answer (click here)
107. Wireless Network Security - Answer (click here)
108. IEEE 802.11 Wireless LAN Overview: Wi-Fi Alliance, Protocol
Architecture, Network Components - Answer (click here)
109. IEEE 802.11i Wireless LAN Security - Answer (click here)
110. Wireless Application Protocol Overview - Answer (click here)
111. Wireless Transport Layer Security - Answer (click here)
112. WAP End-to-End Security - Answer (click here)
113. Electronic Mail Security - Answer (click here)
114. Pretty Good Privacy - Answer (click here)
115. S/MIME - Answer (click here)
116. DomainKeys Identified Mail - Answer (click here)
117. IP Security(IPsec) - Answer (click here)
118. IP Security Overview - Answer (click here)
119. IP Security Policy - Answer (click here)
120. Encapsulating Security Payload - Answer (click here)
121. Combining Security Associations - Answer (click here)
122. Internet Key Exchange - Answer (click here)
123. Cryptographic Suites - Answer (click here)
124. Intruders - Answer (click here)
125. Intruders: Behavior Patterns and Techniques - Answer (click here)
126. Intrusion Detection - Answer (click here)
127. Password Management - Answer (click here)

Chapter 21 Malicious Software


1. Concepts and Definition of Computer Security - Answer (click here)
2. The Challenges of Computer Security - Answer (click here)
3. The OSI Security Architecture - Answer (click here)
4. Security Attacks: Passive and Active Attacks - Answer (click here)
5. Security Services - Answer (click here)
6. Security Mechanisms - Answer (click here)
7. A Model For Network Security - Answer (click here)
8. Classical Encryption Techniques - Answer (click here)
9. Symmetric Cipher Model - Answer (click here)
10. Substitution Techniques - Answer (click here)
11. Transposition Techniques - Answer (click here)
12. Rotor Machines - Answer (click here)
13. Steganography - Answer (click here)
14. Block Ciphers and the Data Encryption Standard - Answer (click here)
15. Block Cipher Principles - Answer (click here)
16. The Data Encryption Standard - Answer (click here)
17. A DES(Data Encryption Standard) Example - Answer (click here)
18. The Strength of DES(Data Encryption Standard) - Answer (click here)
19. Differential and Linear Cryptanalysis - Answer (click here)
20. Block Cipher Design Principles - Answer (click here)
21. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
22. Divisibility and the Division Algorithm - Answer (click here)
23. The Euclidean Algorithm - Answer (click here)
24. Modular Arithmetic - Answer (click here)
25. Groups, Rings, and Fields - Answer (click here)
26. Finite Fields Of The Form GF(p) - Answer (click here)
27. Polynomial Arithmetic - Answer (click here)
28. Finite Fields of the Form GF(2n) - Answer (click here)
29. Advanced Encryption Standard(AES) - Answer (click here)
30. Finite Field Arithmetic - Answer (click here)
31. AES(Advanced Encryption Standard) Structure - Answer (click here)
32. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
33. AES Key Expansion - Answer (click here)
34. An Advanced Encryption Standard(AES) Example - Answer (click here)
35. AES(Advanced Encryption Standard) Implementation - Answer (click here)
36. Block Cipher Operation - Answer (click here)
37. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
38. Electronic Code Book - Answer (click here)
39. Cipher Block Chaining(CBC) Mode - Answer (click here)
40. Cipher Feedback Mode - Answer (click here)
41. Output Feedback Mode - Answer (click here)
42. Counter Mode - Answer (click here)
43. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
44. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
45. Principles of Pseudorandom Number Generation - Answer (click here)
46. Pseudorandom Number Generators - Answer (click here)
47. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
48. Stream Ciphers - Answer (click here)
49. RC4 - Answer (click here)
50. True Random Number Generators - Answer (click here)
51. Introduction to Number Theory - Answer (click here)
52. Prime Numbers - Answer (click here)
53. Fermat’s And Euler’s Theorems - Answer (click here)
54. Testing for Primality - Answer (click here)
55. The Chinese Remainder Theorem - Answer (click here)
56. Discrete Logarithms - Answer (click here)
57. Public-Key Cryptography and RSA - Answer (click here)
58. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
59. The RSA Algorithm - Answer (click here)
60. Description of the RSA Algorithm - Answer (click here)
61. The Security of RSA - Answer (click here)
62. Other Public-Key Cryptosystems - Answer (click here)
63. Diffie-Hellman Key Exchange - Answer (click here)
64. Elgamal Cryptographic System - Answer (click here)
65. Elliptic Curve Arithmetic - Answer (click here)
66. Elliptic Curve Cryptography - Answer (click here)
67. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
68. Cryptographic Hash Functions - Answer (click here)
69. Applications of Cryptographic Hash Functions - Answer (click here)
70. Two Simple Hash Functions - Answer (click here)
71. Requirements and Security - Answer (click here)
72. Hash Functions Based on Cipher Block Chaining - Answer (click here)
73. Secure Hash Algorithm (SHA) - Answer (click here)
74. SHA-3 - Answer (click here)
75. Message Authentication Codes - Answer (click here)
76. Message Authentication Requirements - Answer (click here)
77. Message Authentication Functions - Answer (click here)
78. Requirements For Message Authentication Codes - Answer (click here)
79. Security of MACS - Answer (click here)
80. MACS Based on Hash Functions: HMAC - Answer (click here)
81. MACS Based on Block Ciphers: DAA And CMAC - Answer (click here)
82. Authenticated Encryption: CCM and GCM - Answer (click here)
83. Pseudorandom Number Generation Using Hash Functions and MACS -
Answer (click here)
84. Digital Signatures - Answer (click here)
85. Digital Signatures: Properties, Attacks and Forgeries - Answer (click here)
86. ELGAMAL Digital Signature Scheme - Answer (click here)
87. Schnorr Digital Signature Scheme - Answer (click here)
88. Digital Signature Standard - Answer (click here)
89. Key Management and Distribution - Answer (click here)
90. Symmetric Key Distribution Using Symmetric Encryption - Answer (click
here)
91. Symmetric Key Distribution Using Asymmetric Encryption - Answer
(click here)
92. Distribution of Public Keys - Answer (click here)
93. X.509 Certificates - Answer (click here)
94. Public-Key Infrastructure - Answer (click here)
95. User Authentication - Answer (click here)
96. Remote User-Authentication Principles - Answer (click here)
97. Remote User-Authentication Using Symmetric Encryption - Answer (click
here)
98. Kerberos - Answer (click here)
99. Remote User Authentication Using Asymmetric Encryption - Answer
(click here)
100. Federated Identity Management - Answer (click here)
101. Transport-Level Security - Answer (click here)
102. Web Security Considerations - Answer (click here)
103. Secure Socket Layer and Transport Layer Security - Answer (click here)
104. Transport Layer Security - Answer (click here)
105. HTTPS - Answer (click here)
106. Secure Shell (SSH) - Answer (click here)
107. Wireless Network Security - Answer (click here)
108. IEEE 802.11 Wireless LAN Overview: Wi-Fi Alliance, Protocol
Architecture, Network Components - Answer (click here)
109. IEEE 802.11i Wireless LAN Security - Answer (click here)
110. Wireless Application Protocol Overview - Answer (click here)
111. Wireless Transport Layer Security - Answer (click here)
112. WAP End-to-End Security - Answer (click here)
113. Electronic Mail Security - Answer (click here)
114. Pretty Good Privacy - Answer (click here)
115. S/MIME - Answer (click here)
116. DomainKeys Identified Mail - Answer (click here)
117. IP Security(IPsec) - Answer (click here)
118. IP Security Overview - Answer (click here)
119. IP Security Policy - Answer (click here)
120. Encapsulating Security Payload - Answer (click here)
121. Combining Security Associations - Answer (click here)
122. Internet Key Exchange - Answer (click here)
123. Cryptographic Suites - Answer (click here)
124. Intruders - Answer (click here)
125. Intruders: Behavior Patterns and Techniques - Answer (click here)
126. Intrusion Detection - Answer (click here)
127. Password Management - Answer (click here)
128. Malicious Software - Answer (click here)
129. Types of Malicious Software - Answer (click here)
130. Computer Viruses: Nature, Classification, Virus Kits - Answer (click here)
131. Computer Virus Countermeasures - Answer (click here)
132. Computer or Network Worms - Answer (click here)
133. Distributed Denial of Service Attacks - Answer (click here)
134. Firewalls - Answer (click here)

Chapter 22 Firewalls
1. Concepts and Definition of Computer Security - Answer (click here)
2. The Challenges of Computer Security - Answer (click here)
3. The OSI Security Architecture - Answer (click here)
4. Security Attacks: Passive and Active Attacks - Answer (click here)
5. Security Services - Answer (click here)
6. Security Mechanisms - Answer (click here)
7. A Model For Network Security - Answer (click here)
8. Classical Encryption Techniques - Answer (click here)
9. Symmetric Cipher Model - Answer (click here)
10. Substitution Techniques - Answer (click here)
11. Transposition Techniques - Answer (click here)
12. Rotor Machines - Answer (click here)
13. Steganography - Answer (click here)
14. Block Ciphers and the Data Encryption Standard - Answer (click here)
15. Block Cipher Principles - Answer (click here)
16. The Data Encryption Standard - Answer (click here)
17. A DES(Data Encryption Standard) Example - Answer (click here)
18. The Strength of DES(Data Encryption Standard) - Answer (click here)
19. Differential and Linear Cryptanalysis - Answer (click here)
20. Block Cipher Design Principles - Answer (click here)
21. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
22. Divisibility and the Division Algorithm - Answer (click here)
23. The Euclidean Algorithm - Answer (click here)
24. Modular Arithmetic - Answer (click here)
25. Groups, Rings, and Fields - Answer (click here)
26. Finite Fields Of The Form GF(p) - Answer (click here)
27. Polynomial Arithmetic - Answer (click here)
28. Finite Fields of the Form GF(2n) - Answer (click here)
29. Advanced Encryption Standard(AES) - Answer (click here)
30. Finite Field Arithmetic - Answer (click here)
31. AES(Advanced Encryption Standard) Structure - Answer (click here)
32. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
33. AES Key Expansion - Answer (click here)
34. An Advanced Encryption Standard(AES) Example - Answer (click here)
35. AES(Advanced Encryption Standard) Implementation - Answer (click here)
36. Block Cipher Operation - Answer (click here)
37. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
38. Electronic Code Book - Answer (click here)
39. Cipher Block Chaining(CBC) Mode - Answer (click here)
40. Cipher Feedback Mode - Answer (click here)
41. Output Feedback Mode - Answer (click here)
42. Counter Mode - Answer (click here)
43. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
44. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
45. Principles of Pseudorandom Number Generation - Answer (click here)
46. Pseudorandom Number Generators - Answer (click here)
47. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
48. Stream Ciphers - Answer (click here)
49. RC4 - Answer (click here)
50. True Random Number Generators - Answer (click here)
51. Introduction to Number Theory - Answer (click here)
52. Prime Numbers - Answer (click here)
53. Fermat’s And Euler’s Theorems - Answer (click here)
54. Testing for Primality - Answer (click here)
55. The Chinese Remainder Theorem - Answer (click here)
56. Discrete Logarithms - Answer (click here)
57. Public-Key Cryptography and RSA - Answer (click here)
58. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
59. The RSA Algorithm - Answer (click here)
60. Description of the RSA Algorithm - Answer (click here)
61. The Security of RSA - Answer (click here)
62. Other Public-Key Cryptosystems - Answer (click here)
63. Diffie-Hellman Key Exchange - Answer (click here)
64. Elgamal Cryptographic System - Answer (click here)
65. Elliptic Curve Arithmetic - Answer (click here)
66. Elliptic Curve Cryptography - Answer (click here)
67. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
68. Cryptographic Hash Functions - Answer (click here)
69. Applications of Cryptographic Hash Functions - Answer (click here)
70. Two Simple Hash Functions - Answer (click here)
71. Requirements and Security - Answer (click here)
72. Hash Functions Based on Cipher Block Chaining - Answer (click here)
73. Secure Hash Algorithm (SHA) - Answer (click here)
74. SHA-3 - Answer (click here)
75. Message Authentication Codes - Answer (click here)
76. Message Authentication Requirements - Answer (click here)
77. Message Authentication Functions - Answer (click here)
78. Requirements For Message Authentication Codes - Answer (click here)
79. Security of MACS - Answer (click here)
80. MACS Based on Hash Functions: HMAC - Answer (click here)
81. MACS Based on Block Ciphers: DAA And CMAC - Answer (click here)
82. Authenticated Encryption: CCM and GCM - Answer (click here)
83. Pseudorandom Number Generation Using Hash Functions and MACS -
Answer (click here)
84. Digital Signatures - Answer (click here)
85. Digital Signatures: Properties, Attacks and Forgeries - Answer (click here)
86. ELGAMAL Digital Signature Scheme - Answer (click here)
87. Schnorr Digital Signature Scheme - Answer (click here)
88. Digital Signature Standard - Answer (click here)
89. Key Management and Distribution - Answer (click here)
90. Symmetric Key Distribution Using Symmetric Encryption - Answer (click
here)
91. Symmetric Key Distribution Using Asymmetric Encryption - Answer
(click here)
92. Distribution of Public Keys - Answer (click here)
93. X.509 Certificates - Answer (click here)
94. Public-Key Infrastructure - Answer (click here)
95. User Authentication - Answer (click here)
96. Remote User-Authentication Principles - Answer (click here)
97. Remote User-Authentication Using Symmetric Encryption - Answer (click
here)
98. Kerberos - Answer (click here)
99. Remote User Authentication Using Asymmetric Encryption - Answer
(click here)
100. Federated Identity Management - Answer (click here)
101. Transport-Level Security - Answer (click here)
102. Web Security Considerations - Answer (click here)
103. Secure Socket Layer and Transport Layer Security - Answer (click here)
104. Transport Layer Security - Answer (click here)
105. HTTPS - Answer (click here)
106. Secure Shell (SSH) - Answer (click here)
107. Wireless Network Security - Answer (click here)
108. IEEE 802.11 Wireless LAN Overview: Wi-Fi Alliance, Protocol
Architecture, Network Components - Answer (click here)
109. IEEE 802.11i Wireless LAN Security - Answer (click here)
110. Wireless Application Protocol Overview - Answer (click here)
111. Wireless Transport Layer Security - Answer (click here)
112. WAP End-to-End Security - Answer (click here)
113. Electronic Mail Security - Answer (click here)
114. Pretty Good Privacy - Answer (click here)
115. S/MIME - Answer (click here)
116. DomainKeys Identified Mail - Answer (click here)
117. IP Security(IPsec) - Answer (click here)
118. IP Security Overview - Answer (click here)
119. IP Security Policy - Answer (click here)
120. Encapsulating Security Payload - Answer (click here)
121. Combining Security Associations - Answer (click here)
122. Internet Key Exchange - Answer (click here)
123. Cryptographic Suites - Answer (click here)
124. Intruders - Answer (click here)
125. Intruders: Behavior Patterns and Techniques - Answer (click here)
126. Intrusion Detection - Answer (click here)
127. Password Management - Answer (click here)
128. Malicious Software - Answer (click here)
129. Types of Malicious Software - Answer (click here)
130. Computer Viruses: Nature, Classification, Virus Kits - Answer (click here)
131. Computer Virus Countermeasures - Answer (click here)
132. Computer or Network Worms - Answer (click here)
133. Distributed Denial of Service Attacks - Answer (click here)
134. Firewalls - Answer (click here)
135. The Need for Firewalls - Answer (click here)
136. Firewall Characteristics and limitations - Answer (click here)
137. Types of Firewalls - Answer (click here)
138. Firewall Basing - Answer (click here)
139. Firewall Location and Configurations - Answer (click here)

PART SEVEN LEGAL AND ETHICAL ISSUES


Chapter 23 Legal and Ethical Issues
1. Concepts and Definition of Computer Security - Answer (click here)
2. The Challenges of Computer Security - Answer (click here)
3. The OSI Security Architecture - Answer (click here)
4. Security Attacks: Passive and Active Attacks - Answer (click here)
5. Security Services - Answer (click here)
6. Security Mechanisms - Answer (click here)
7. A Model For Network Security - Answer (click here)
8. Classical Encryption Techniques - Answer (click here)
9. Symmetric Cipher Model - Answer (click here)
10. Substitution Techniques - Answer (click here)
11. Transposition Techniques - Answer (click here)
12. Rotor Machines - Answer (click here)
13. Steganography - Answer (click here)
14. Block Ciphers and the Data Encryption Standard - Answer (click here)
15. Block Cipher Principles - Answer (click here)
16. The Data Encryption Standard - Answer (click here)
17. A DES(Data Encryption Standard) Example - Answer (click here)
18. The Strength of DES(Data Encryption Standard) - Answer (click here)
19. Differential and Linear Cryptanalysis - Answer (click here)
20. Block Cipher Design Principles - Answer (click here)
21. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
22. Divisibility and the Division Algorithm - Answer (click here)
23. The Euclidean Algorithm - Answer (click here)
24. Modular Arithmetic - Answer (click here)
25. Groups, Rings, and Fields - Answer (click here)
26. Finite Fields Of The Form GF(p) - Answer (click here)
27. Polynomial Arithmetic - Answer (click here)
28. Finite Fields of the Form GF(2n) - Answer (click here)
29. Advanced Encryption Standard(AES) - Answer (click here)
30. Finite Field Arithmetic - Answer (click here)
31. AES(Advanced Encryption Standard) Structure - Answer (click here)
32. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
33. AES Key Expansion - Answer (click here)
34. An Advanced Encryption Standard(AES) Example - Answer (click here)
35. AES(Advanced Encryption Standard) Implementation - Answer (click here)
36. Block Cipher Operation - Answer (click here)
37. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
38. Electronic Code Book - Answer (click here)
39. Cipher Block Chaining(CBC) Mode - Answer (click here)
40. Cipher Feedback Mode - Answer (click here)
41. Output Feedback Mode - Answer (click here)
42. Counter Mode - Answer (click here)
43. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
44. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
45. Principles of Pseudorandom Number Generation - Answer (click here)
46. Pseudorandom Number Generators - Answer (click here)
47. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
48. Stream Ciphers - Answer (click here)
49. RC4 - Answer (click here)
50. True Random Number Generators - Answer (click here)
51. Introduction to Number Theory - Answer (click here)
52. Prime Numbers - Answer (click here)
53. Fermat’s And Euler’s Theorems - Answer (click here)
54. Testing for Primality - Answer (click here)
55. The Chinese Remainder Theorem - Answer (click here)
56. Discrete Logarithms - Answer (click here)
57. Public-Key Cryptography and RSA - Answer (click here)
58. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
59. The RSA Algorithm - Answer (click here)
60. Description of the RSA Algorithm - Answer (click here)
61. The Security of RSA - Answer (click here)
62. Other Public-Key Cryptosystems - Answer (click here)
63. Diffie-Hellman Key Exchange - Answer (click here)
64. Elgamal Cryptographic System - Answer (click here)
65. Elliptic Curve Arithmetic - Answer (click here)
66. Elliptic Curve Cryptography - Answer (click here)
67. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
68. Cryptographic Hash Functions - Answer (click here)
69. Applications of Cryptographic Hash Functions - Answer (click here)
70. Two Simple Hash Functions - Answer (click here)
71. Requirements and Security - Answer (click here)
72. Hash Functions Based on Cipher Block Chaining - Answer (click here)
73. Secure Hash Algorithm (SHA) - Answer (click here)
74. SHA-3 - Answer (click here)
75. Message Authentication Codes - Answer (click here)
76. Message Authentication Requirements - Answer (click here)
77. Message Authentication Functions - Answer (click here)
78. Requirements For Message Authentication Codes - Answer (click here)
79. Security of MACS - Answer (click here)
80. MACS Based on Hash Functions: HMAC - Answer (click here)
81. MACS Based on Block Ciphers: DAA And CMAC - Answer (click here)
82. Authenticated Encryption: CCM and GCM - Answer (click here)
83. Pseudorandom Number Generation Using Hash Functions and MACS -
Answer (click here)
84. Digital Signatures - Answer (click here)
85. Digital Signatures: Properties, Attacks and Forgeries - Answer (click here)
86. ELGAMAL Digital Signature Scheme - Answer (click here)
87. Schnorr Digital Signature Scheme - Answer (click here)
88. Digital Signature Standard - Answer (click here)
89. Key Management and Distribution - Answer (click here)
90. Symmetric Key Distribution Using Symmetric Encryption - Answer (click
here)
91. Symmetric Key Distribution Using Asymmetric Encryption - Answer
(click here)
92. Distribution of Public Keys - Answer (click here)
93. X.509 Certificates - Answer (click here)
94. Public-Key Infrastructure - Answer (click here)
95. User Authentication - Answer (click here)
96. Remote User-Authentication Principles - Answer (click here)
97. Remote User-Authentication Using Symmetric Encryption - Answer (click
here)
98. Kerberos - Answer (click here)
99. Remote User Authentication Using Asymmetric Encryption - Answer
(click here)
100. Federated Identity Management - Answer (click here)
101. Transport-Level Security - Answer (click here)
102. Web Security Considerations - Answer (click here)
103. Secure Socket Layer and Transport Layer Security - Answer (click here)
104. Transport Layer Security - Answer (click here)
105. HTTPS - Answer (click here)
106. Secure Shell (SSH) - Answer (click here)
107. Wireless Network Security - Answer (click here)
108. IEEE 802.11 Wireless LAN Overview: Wi-Fi Alliance, Protocol
Architecture, Network Components - Answer (click here)
109. IEEE 802.11i Wireless LAN Security - Answer (click here)
110. Wireless Application Protocol Overview - Answer (click here)
111. Wireless Transport Layer Security - Answer (click here)
112. WAP End-to-End Security - Answer (click here)
113. Electronic Mail Security - Answer (click here)
114. Pretty Good Privacy - Answer (click here)
115. S/MIME - Answer (click here)
116. DomainKeys Identified Mail - Answer (click here)
117. IP Security(IPsec) - Answer (click here)
118. IP Security Overview - Answer (click here)
119. IP Security Policy - Answer (click here)
120. Encapsulating Security Payload - Answer (click here)
121. Combining Security Associations - Answer (click here)
122. Internet Key Exchange - Answer (click here)
123. Cryptographic Suites - Answer (click here)
124. Intruders - Answer (click here)
125. Intruders: Behavior Patterns and Techniques - Answer (click here)
126. Intrusion Detection - Answer (click here)
127. Password Management - Answer (click here)
128. Malicious Software - Answer (click here)
129. Types of Malicious Software - Answer (click here)
130. Computer Viruses: Nature, Classification, Virus Kits - Answer (click here)
131. Computer Virus Countermeasures - Answer (click here)
132. Computer or Network Worms - Answer (click here)
133. Distributed Denial of Service Attacks - Answer (click here)
134. Firewalls - Answer (click here)
135. The Need for Firewalls - Answer (click here)
136. Firewall Characteristics and limitations - Answer (click here)
137. Types of Firewalls - Answer (click here)
138. Firewall Basing - Answer (click here)
139. Firewall Location and Configurations - Answer (click here)
140. Legal And Ethical Aspects - Answer (click here)
141. Cybercrime and Computer Crime - Answer (click here)
142. Types of Computer Crime - Answer (click here)
143. Intellectual Property - Answer (click here)
144. Network and Computer Privacy - Answer (click here)
145. Ethical Issues - Network or Computer - Answer (click here)