Vous êtes sur la page 1sur 83

Cryptography and Network Security

Subject : Cryptography and Network Security


Part 1
1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)

Part 2
1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)
8. Simplified Data Encryption Standard (S-DES) - Answer (click here)
9. Block Cipher Principles - Answer (click here)
10. Multiple Encryption & DES - Answer (click here)
11. Modes of Operation - Answer (click here)
12. Stream Ciphers - Answer (click here)
13. RC4 - Answer (click here)
14. Principles of Public Key Cryptography - Answer (click here)
15. RSA Algorithm - Answer (click here)

Part 3
1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)
8. Simplified Data Encryption Standard (S-DES) - Answer (click here)
9. Block Cipher Principles - Answer (click here)
10. Multiple Encryption & DES - Answer (click here)
11. Modes of Operation - Answer (click here)
12. Stream Ciphers - Answer (click here)
13. RC4 - Answer (click here)
14. Principles of Public Key Cryptography - Answer (click here)
15. RSA Algorithm - Answer (click here)
16. Diffie-Hellman Key Exchange - Answer (click here)
17. Elliptic Curve Cryptography - Answer (click here)
18. Hash Functions - Answer (click here)
19. Simple Hash Functions - Answer (click here)
20. Birthday Attacks - Answer (click here)
21. Security of Hash Functions and Macs - Answer (click here)
22. Secure Hash Algorithm - Answer (click here)
23. Digital Signatures - Answer (click here)
24. Direct Digital Signatures - Answer (click here)
25. Digital Signature Algorithm(DSA) - Answer (click here)

Part 4
1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)
8. Simplified Data Encryption Standard (S-DES) - Answer (click here)
9. Block Cipher Principles - Answer (click here)
10. Multiple Encryption & DES - Answer (click here)
11. Modes of Operation - Answer (click here)
12. Stream Ciphers - Answer (click here)
13. RC4 - Answer (click here)
14. Principles of Public Key Cryptography - Answer (click here)
15. RSA Algorithm - Answer (click here)
16. Diffie-Hellman Key Exchange - Answer (click here)
17. Elliptic Curve Cryptography - Answer (click here)
18. Hash Functions - Answer (click here)
19. Simple Hash Functions - Answer (click here)
20. Birthday Attacks - Answer (click here)
21. Security of Hash Functions and Macs - Answer (click here)
22. Secure Hash Algorithm - Answer (click here)
23. Digital Signatures - Answer (click here)
24. Direct Digital Signatures - Answer (click here)
25. Digital Signature Algorithm(DSA) - Answer (click here)
26. Authentication Applications - Answer (click here)
27. Kerbero V4 Authentication Dialogue Message Exchange - Answer (click
here)
28. X.509 Certificates - Answer (click here)
29. Authentication Procedures - Answer (click here)
30. Electronic Mail Security - Answer (click here)
31. Public-Key Management - Answer (click here)
32. S/MIME - Answer (click here)
33. S/MIME Functionality and Messages - Answer (click here)

Part 5
1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)
8. Simplified Data Encryption Standard (S-DES) - Answer (click here)
9. Block Cipher Principles - Answer (click here)
10. Multiple Encryption & DES - Answer (click here)
11. Modes of Operation - Answer (click here)
12. Stream Ciphers - Answer (click here)
13. RC4 - Answer (click here)
14. Principles of Public Key Cryptography - Answer (click here)
15. RSA Algorithm - Answer (click here)
16. Diffie-Hellman Key Exchange - Answer (click here)
17. Elliptic Curve Cryptography - Answer (click here)
18. Hash Functions - Answer (click here)
19. Simple Hash Functions - Answer (click here)
20. Birthday Attacks - Answer (click here)
21. Security of Hash Functions and Macs - Answer (click here)
22. Secure Hash Algorithm - Answer (click here)
23. Digital Signatures - Answer (click here)
24. Direct Digital Signatures - Answer (click here)
25. Digital Signature Algorithm(DSA) - Answer (click here)
26. Authentication Applications - Answer (click here)
27. Kerbero V4 Authentication Dialogue Message Exchange - Answer (click
here)
28. X.509 Certificates - Answer (click here)
29. Authentication Procedures - Answer (click here)
30. Electronic Mail Security - Answer (click here)
31. Public-Key Management - Answer (click here)
32. S/MIME - Answer (click here)
33. S/MIME Functionality and Messages - Answer (click here)
34. Intruders - Answer (click here)
35. Intrusion Detection - Answer (click here)
36. Password Management - Answer (click here)
37. Firewalls: design principles, characteristics, Limitations, Types - Answer
(click here)
38. Firewall configurations - Answer (click here)
39. Trusted systems - Answer (click here)
40. Viruses And Related Threats - Answer (click here)
41. Types of Network Viruses - Answer (click here)
42. Network Virus Countermeasures - Answer (click here)

CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES


AND PRACTICE by William Stallings
Chapter 1 Overview
1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)
8. Simplified Data Encryption Standard (S-DES) - Answer (click here)
9. Block Cipher Principles - Answer (click here)
10. Multiple Encryption & DES - Answer (click here)
11. Modes of Operation - Answer (click here)
12. Stream Ciphers - Answer (click here)
13. RC4 - Answer (click here)
14. Principles of Public Key Cryptography - Answer (click here)
15. RSA Algorithm - Answer (click here)
16. Diffie-Hellman Key Exchange - Answer (click here)
17. Elliptic Curve Cryptography - Answer (click here)
18. Hash Functions - Answer (click here)
19. Simple Hash Functions - Answer (click here)
20. Birthday Attacks - Answer (click here)
21. Security of Hash Functions and Macs - Answer (click here)
22. Secure Hash Algorithm - Answer (click here)
23. Digital Signatures - Answer (click here)
24. Direct Digital Signatures - Answer (click here)
25. Digital Signature Algorithm(DSA) - Answer (click here)
26. Authentication Applications - Answer (click here)
27. Kerbero V4 Authentication Dialogue Message Exchange - Answer (click
here)
28. X.509 Certificates - Answer (click here)
29. Authentication Procedures - Answer (click here)
30. Electronic Mail Security - Answer (click here)
31. Public-Key Management - Answer (click here)
32. S/MIME - Answer (click here)
33. S/MIME Functionality and Messages - Answer (click here)
34. Intruders - Answer (click here)
35. Intrusion Detection - Answer (click here)
36. Password Management - Answer (click here)
37. Firewalls: design principles, characteristics, Limitations, Types - Answer
(click here)
38. Firewall configurations - Answer (click here)
39. Trusted systems - Answer (click here)
40. Viruses And Related Threats - Answer (click here)
41. Types of Network Viruses - Answer (click here)
42. Network Virus Countermeasures - Answer (click here)
43. Concepts and Definition of Computer Security - Answer (click here)
44. The Challenges of Computer Security - Answer (click here)
45. The OSI Security Architecture - Answer (click here)
46. Security Attacks: Passive and Active Attacks - Answer (click here)
47. Security Services - Answer (click here)
48. Security Mechanisms - Answer (click here)
49. A Model For Network Security - Answer (click here)
50. Classical Encryption Techniques - Answer (click here)

PART ONE SYMMETRIC CIPHERS


Chapter 2 Classical Encryption Techniques
1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)
8. Simplified Data Encryption Standard (S-DES) - Answer (click here)
9. Block Cipher Principles - Answer (click here)
10. Multiple Encryption & DES - Answer (click here)
11. Modes of Operation - Answer (click here)
12. Stream Ciphers - Answer (click here)
13. RC4 - Answer (click here)
14. Principles of Public Key Cryptography - Answer (click here)
15. RSA Algorithm - Answer (click here)
16. Diffie-Hellman Key Exchange - Answer (click here)
17. Elliptic Curve Cryptography - Answer (click here)
18. Hash Functions - Answer (click here)
19. Simple Hash Functions - Answer (click here)
20. Birthday Attacks - Answer (click here)
21. Security of Hash Functions and Macs - Answer (click here)
22. Secure Hash Algorithm - Answer (click here)
23. Digital Signatures - Answer (click here)
24. Direct Digital Signatures - Answer (click here)
25. Digital Signature Algorithm(DSA) - Answer (click here)
26. Authentication Applications - Answer (click here)
27. Kerbero V4 Authentication Dialogue Message Exchange - Answer (click
here)
28. X.509 Certificates - Answer (click here)
29. Authentication Procedures - Answer (click here)
30. Electronic Mail Security - Answer (click here)
31. Public-Key Management - Answer (click here)
32. S/MIME - Answer (click here)
33. S/MIME Functionality and Messages - Answer (click here)
34. Intruders - Answer (click here)
35. Intrusion Detection - Answer (click here)
36. Password Management - Answer (click here)
37. Firewalls: design principles, characteristics, Limitations, Types - Answer
(click here)
38. Firewall configurations - Answer (click here)
39. Trusted systems - Answer (click here)
40. Viruses And Related Threats - Answer (click here)
41. Types of Network Viruses - Answer (click here)
42. Network Virus Countermeasures - Answer (click here)
43. Concepts and Definition of Computer Security - Answer (click here)
44. The Challenges of Computer Security - Answer (click here)
45. The OSI Security Architecture - Answer (click here)
46. Security Attacks: Passive and Active Attacks - Answer (click here)
47. Security Services - Answer (click here)
48. Security Mechanisms - Answer (click here)
49. A Model For Network Security - Answer (click here)
50. Classical Encryption Techniques - Answer (click here)
51. Symmetric Cipher Model - Answer (click here)
52. Substitution Techniques - Answer (click here)
53. Transposition Techniques - Answer (click here)
54. Rotor Machines - Answer (click here)
55. Steganography - Answer (click here)

Chapter 3 Block Ciphers and the Data Encryption Standard


1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)
8. Simplified Data Encryption Standard (S-DES) - Answer (click here)
9. Block Cipher Principles - Answer (click here)
10. Multiple Encryption & DES - Answer (click here)
11. Modes of Operation - Answer (click here)
12. Stream Ciphers - Answer (click here)
13. RC4 - Answer (click here)
14. Principles of Public Key Cryptography - Answer (click here)
15. RSA Algorithm - Answer (click here)
16. Diffie-Hellman Key Exchange - Answer (click here)
17. Elliptic Curve Cryptography - Answer (click here)
18. Hash Functions - Answer (click here)
19. Simple Hash Functions - Answer (click here)
20. Birthday Attacks - Answer (click here)
21. Security of Hash Functions and Macs - Answer (click here)
22. Secure Hash Algorithm - Answer (click here)
23. Digital Signatures - Answer (click here)
24. Direct Digital Signatures - Answer (click here)
25. Digital Signature Algorithm(DSA) - Answer (click here)
26. Authentication Applications - Answer (click here)
27. Kerbero V4 Authentication Dialogue Message Exchange - Answer (click
here)
28. X.509 Certificates - Answer (click here)
29. Authentication Procedures - Answer (click here)
30. Electronic Mail Security - Answer (click here)
31. Public-Key Management - Answer (click here)
32. S/MIME - Answer (click here)
33. S/MIME Functionality and Messages - Answer (click here)
34. Intruders - Answer (click here)
35. Intrusion Detection - Answer (click here)
36. Password Management - Answer (click here)
37. Firewalls: design principles, characteristics, Limitations, Types - Answer
(click here)
38. Firewall configurations - Answer (click here)
39. Trusted systems - Answer (click here)
40. Viruses And Related Threats - Answer (click here)
41. Types of Network Viruses - Answer (click here)
42. Network Virus Countermeasures - Answer (click here)
43. Concepts and Definition of Computer Security - Answer (click here)
44. The Challenges of Computer Security - Answer (click here)
45. The OSI Security Architecture - Answer (click here)
46. Security Attacks: Passive and Active Attacks - Answer (click here)
47. Security Services - Answer (click here)
48. Security Mechanisms - Answer (click here)
49. A Model For Network Security - Answer (click here)
50. Classical Encryption Techniques - Answer (click here)
51. Symmetric Cipher Model - Answer (click here)
52. Substitution Techniques - Answer (click here)
53. Transposition Techniques - Answer (click here)
54. Rotor Machines - Answer (click here)
55. Steganography - Answer (click here)
56. Block Ciphers and the Data Encryption Standard - Answer (click here)
57. Block Cipher Principles - Answer (click here)
58. The Data Encryption Standard - Answer (click here)
59. A DES(Data Encryption Standard) Example - Answer (click here)
60. The Strength of DES(Data Encryption Standard) - Answer (click here)
61. Differential and Linear Cryptanalysis - Answer (click here)
62. Block Cipher Design Principles - Answer (click here)

Chapter 4 Basic Concepts in Number Theory and Finite Fields


1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)
8. Simplified Data Encryption Standard (S-DES) - Answer (click here)
9. Block Cipher Principles - Answer (click here)
10. Multiple Encryption & DES - Answer (click here)
11. Modes of Operation - Answer (click here)
12. Stream Ciphers - Answer (click here)
13. RC4 - Answer (click here)
14. Principles of Public Key Cryptography - Answer (click here)
15. RSA Algorithm - Answer (click here)
16. Diffie-Hellman Key Exchange - Answer (click here)
17. Elliptic Curve Cryptography - Answer (click here)
18. Hash Functions - Answer (click here)
19. Simple Hash Functions - Answer (click here)
20. Birthday Attacks - Answer (click here)
21. Security of Hash Functions and Macs - Answer (click here)
22. Secure Hash Algorithm - Answer (click here)
23. Digital Signatures - Answer (click here)
24. Direct Digital Signatures - Answer (click here)
25. Digital Signature Algorithm(DSA) - Answer (click here)
26. Authentication Applications - Answer (click here)
27. Kerbero V4 Authentication Dialogue Message Exchange - Answer (click
here)
28. X.509 Certificates - Answer (click here)
29. Authentication Procedures - Answer (click here)
30. Electronic Mail Security - Answer (click here)
31. Public-Key Management - Answer (click here)
32. S/MIME - Answer (click here)
33. S/MIME Functionality and Messages - Answer (click here)
34. Intruders - Answer (click here)
35. Intrusion Detection - Answer (click here)
36. Password Management - Answer (click here)
37. Firewalls: design principles, characteristics, Limitations, Types - Answer
(click here)
38. Firewall configurations - Answer (click here)
39. Trusted systems - Answer (click here)
40. Viruses And Related Threats - Answer (click here)
41. Types of Network Viruses - Answer (click here)
42. Network Virus Countermeasures - Answer (click here)
43. Concepts and Definition of Computer Security - Answer (click here)
44. The Challenges of Computer Security - Answer (click here)
45. The OSI Security Architecture - Answer (click here)
46. Security Attacks: Passive and Active Attacks - Answer (click here)
47. Security Services - Answer (click here)
48. Security Mechanisms - Answer (click here)
49. A Model For Network Security - Answer (click here)
50. Classical Encryption Techniques - Answer (click here)
51. Symmetric Cipher Model - Answer (click here)
52. Substitution Techniques - Answer (click here)
53. Transposition Techniques - Answer (click here)
54. Rotor Machines - Answer (click here)
55. Steganography - Answer (click here)
56. Block Ciphers and the Data Encryption Standard - Answer (click here)
57. Block Cipher Principles - Answer (click here)
58. The Data Encryption Standard - Answer (click here)
59. A DES(Data Encryption Standard) Example - Answer (click here)
60. The Strength of DES(Data Encryption Standard) - Answer (click here)
61. Differential and Linear Cryptanalysis - Answer (click here)
62. Block Cipher Design Principles - Answer (click here)
63. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
64. Divisibility and the Division Algorithm - Answer (click here)
65. The Euclidean Algorithm - Answer (click here)
66. Modular Arithmetic - Answer (click here)
67. Groups, Rings, and Fields - Answer (click here)
68. Finite Fields Of The Form GF(p) - Answer (click here)
69. Polynomial Arithmetic - Answer (click here)
70. Finite Fields of the Form GF(2n) - Answer (click here)

Chapter 5 Advanced Encryption Standard


1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)
8. Simplified Data Encryption Standard (S-DES) - Answer (click here)
9. Block Cipher Principles - Answer (click here)
10. Multiple Encryption & DES - Answer (click here)
11. Modes of Operation - Answer (click here)
12. Stream Ciphers - Answer (click here)
13. RC4 - Answer (click here)
14. Principles of Public Key Cryptography - Answer (click here)
15. RSA Algorithm - Answer (click here)
16. Diffie-Hellman Key Exchange - Answer (click here)
17. Elliptic Curve Cryptography - Answer (click here)
18. Hash Functions - Answer (click here)
19. Simple Hash Functions - Answer (click here)
20. Birthday Attacks - Answer (click here)
21. Security of Hash Functions and Macs - Answer (click here)
22. Secure Hash Algorithm - Answer (click here)
23. Digital Signatures - Answer (click here)
24. Direct Digital Signatures - Answer (click here)
25. Digital Signature Algorithm(DSA) - Answer (click here)
26. Authentication Applications - Answer (click here)
27. Kerbero V4 Authentication Dialogue Message Exchange - Answer (click
here)
28. X.509 Certificates - Answer (click here)
29. Authentication Procedures - Answer (click here)
30. Electronic Mail Security - Answer (click here)
31. Public-Key Management - Answer (click here)
32. S/MIME - Answer (click here)
33. S/MIME Functionality and Messages - Answer (click here)
34. Intruders - Answer (click here)
35. Intrusion Detection - Answer (click here)
36. Password Management - Answer (click here)
37. Firewalls: design principles, characteristics, Limitations, Types - Answer
(click here)
38. Firewall configurations - Answer (click here)
39. Trusted systems - Answer (click here)
40. Viruses And Related Threats - Answer (click here)
41. Types of Network Viruses - Answer (click here)
42. Network Virus Countermeasures - Answer (click here)
43. Concepts and Definition of Computer Security - Answer (click here)
44. The Challenges of Computer Security - Answer (click here)
45. The OSI Security Architecture - Answer (click here)
46. Security Attacks: Passive and Active Attacks - Answer (click here)
47. Security Services - Answer (click here)
48. Security Mechanisms - Answer (click here)
49. A Model For Network Security - Answer (click here)
50. Classical Encryption Techniques - Answer (click here)
51. Symmetric Cipher Model - Answer (click here)
52. Substitution Techniques - Answer (click here)
53. Transposition Techniques - Answer (click here)
54. Rotor Machines - Answer (click here)
55. Steganography - Answer (click here)
56. Block Ciphers and the Data Encryption Standard - Answer (click here)
57. Block Cipher Principles - Answer (click here)
58. The Data Encryption Standard - Answer (click here)
59. A DES(Data Encryption Standard) Example - Answer (click here)
60. The Strength of DES(Data Encryption Standard) - Answer (click here)
61. Differential and Linear Cryptanalysis - Answer (click here)
62. Block Cipher Design Principles - Answer (click here)
63. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
64. Divisibility and the Division Algorithm - Answer (click here)
65. The Euclidean Algorithm - Answer (click here)
66. Modular Arithmetic - Answer (click here)
67. Groups, Rings, and Fields - Answer (click here)
68. Finite Fields Of The Form GF(p) - Answer (click here)
69. Polynomial Arithmetic - Answer (click here)
70. Finite Fields of the Form GF(2n) - Answer (click here)
71. Advanced Encryption Standard(AES) - Answer (click here)
72. Finite Field Arithmetic - Answer (click here)
73. AES(Advanced Encryption Standard) Structure - Answer (click here)
74. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
75. AES Key Expansion - Answer (click here)
76. An Advanced Encryption Standard(AES) Example - Answer (click here)
77. AES(Advanced Encryption Standard) Implementation - Answer (click here)

Chapter 6 Block Cipher Operation


1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)
8. Simplified Data Encryption Standard (S-DES) - Answer (click here)
9. Block Cipher Principles - Answer (click here)
10. Multiple Encryption & DES - Answer (click here)
11. Modes of Operation - Answer (click here)
12. Stream Ciphers - Answer (click here)
13. RC4 - Answer (click here)
14. Principles of Public Key Cryptography - Answer (click here)
15. RSA Algorithm - Answer (click here)
16. Diffie-Hellman Key Exchange - Answer (click here)
17. Elliptic Curve Cryptography - Answer (click here)
18. Hash Functions - Answer (click here)
19. Simple Hash Functions - Answer (click here)
20. Birthday Attacks - Answer (click here)
21. Security of Hash Functions and Macs - Answer (click here)
22. Secure Hash Algorithm - Answer (click here)
23. Digital Signatures - Answer (click here)
24. Direct Digital Signatures - Answer (click here)
25. Digital Signature Algorithm(DSA) - Answer (click here)
26. Authentication Applications - Answer (click here)
27. Kerbero V4 Authentication Dialogue Message Exchange - Answer (click
here)
28. X.509 Certificates - Answer (click here)
29. Authentication Procedures - Answer (click here)
30. Electronic Mail Security - Answer (click here)
31. Public-Key Management - Answer (click here)
32. S/MIME - Answer (click here)
33. S/MIME Functionality and Messages - Answer (click here)
34. Intruders - Answer (click here)
35. Intrusion Detection - Answer (click here)
36. Password Management - Answer (click here)
37. Firewalls: design principles, characteristics, Limitations, Types - Answer
(click here)
38. Firewall configurations - Answer (click here)
39. Trusted systems - Answer (click here)
40. Viruses And Related Threats - Answer (click here)
41. Types of Network Viruses - Answer (click here)
42. Network Virus Countermeasures - Answer (click here)
43. Concepts and Definition of Computer Security - Answer (click here)
44. The Challenges of Computer Security - Answer (click here)
45. The OSI Security Architecture - Answer (click here)
46. Security Attacks: Passive and Active Attacks - Answer (click here)
47. Security Services - Answer (click here)
48. Security Mechanisms - Answer (click here)
49. A Model For Network Security - Answer (click here)
50. Classical Encryption Techniques - Answer (click here)
51. Symmetric Cipher Model - Answer (click here)
52. Substitution Techniques - Answer (click here)
53. Transposition Techniques - Answer (click here)
54. Rotor Machines - Answer (click here)
55. Steganography - Answer (click here)
56. Block Ciphers and the Data Encryption Standard - Answer (click here)
57. Block Cipher Principles - Answer (click here)
58. The Data Encryption Standard - Answer (click here)
59. A DES(Data Encryption Standard) Example - Answer (click here)
60. The Strength of DES(Data Encryption Standard) - Answer (click here)
61. Differential and Linear Cryptanalysis - Answer (click here)
62. Block Cipher Design Principles - Answer (click here)
63. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
64. Divisibility and the Division Algorithm - Answer (click here)
65. The Euclidean Algorithm - Answer (click here)
66. Modular Arithmetic - Answer (click here)
67. Groups, Rings, and Fields - Answer (click here)
68. Finite Fields Of The Form GF(p) - Answer (click here)
69. Polynomial Arithmetic - Answer (click here)
70. Finite Fields of the Form GF(2n) - Answer (click here)
71. Advanced Encryption Standard(AES) - Answer (click here)
72. Finite Field Arithmetic - Answer (click here)
73. AES(Advanced Encryption Standard) Structure - Answer (click here)
74. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
75. AES Key Expansion - Answer (click here)
76. An Advanced Encryption Standard(AES) Example - Answer (click here)
77. AES(Advanced Encryption Standard) Implementation - Answer (click here)
78. Block Cipher Operation - Answer (click here)
79. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
80. Electronic Code Book - Answer (click here)
81. Cipher Block Chaining(CBC) Mode - Answer (click here)
82. Cipher Feedback Mode - Answer (click here)
83. Output Feedback Mode - Answer (click here)
84. Counter Mode - Answer (click here)
85. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)

Chapter 7 Pseudorandom Number Generation and Stream


Ciphers
1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)
8. Simplified Data Encryption Standard (S-DES) - Answer (click here)
9. Block Cipher Principles - Answer (click here)
10. Multiple Encryption & DES - Answer (click here)
11. Modes of Operation - Answer (click here)
12. Stream Ciphers - Answer (click here)
13. RC4 - Answer (click here)
14. Principles of Public Key Cryptography - Answer (click here)
15. RSA Algorithm - Answer (click here)
16. Diffie-Hellman Key Exchange - Answer (click here)
17. Elliptic Curve Cryptography - Answer (click here)
18. Hash Functions - Answer (click here)
19. Simple Hash Functions - Answer (click here)
20. Birthday Attacks - Answer (click here)
21. Security of Hash Functions and Macs - Answer (click here)
22. Secure Hash Algorithm - Answer (click here)
23. Digital Signatures - Answer (click here)
24. Direct Digital Signatures - Answer (click here)
25. Digital Signature Algorithm(DSA) - Answer (click here)
26. Authentication Applications - Answer (click here)
27. Kerbero V4 Authentication Dialogue Message Exchange - Answer (click
here)
28. X.509 Certificates - Answer (click here)
29. Authentication Procedures - Answer (click here)
30. Electronic Mail Security - Answer (click here)
31. Public-Key Management - Answer (click here)
32. S/MIME - Answer (click here)
33. S/MIME Functionality and Messages - Answer (click here)
34. Intruders - Answer (click here)
35. Intrusion Detection - Answer (click here)
36. Password Management - Answer (click here)
37. Firewalls: design principles, characteristics, Limitations, Types - Answer
(click here)
38. Firewall configurations - Answer (click here)
39. Trusted systems - Answer (click here)
40. Viruses And Related Threats - Answer (click here)
41. Types of Network Viruses - Answer (click here)
42. Network Virus Countermeasures - Answer (click here)
43. Concepts and Definition of Computer Security - Answer (click here)
44. The Challenges of Computer Security - Answer (click here)
45. The OSI Security Architecture - Answer (click here)
46. Security Attacks: Passive and Active Attacks - Answer (click here)
47. Security Services - Answer (click here)
48. Security Mechanisms - Answer (click here)
49. A Model For Network Security - Answer (click here)
50. Classical Encryption Techniques - Answer (click here)
51. Symmetric Cipher Model - Answer (click here)
52. Substitution Techniques - Answer (click here)
53. Transposition Techniques - Answer (click here)
54. Rotor Machines - Answer (click here)
55. Steganography - Answer (click here)
56. Block Ciphers and the Data Encryption Standard - Answer (click here)
57. Block Cipher Principles - Answer (click here)
58. The Data Encryption Standard - Answer (click here)
59. A DES(Data Encryption Standard) Example - Answer (click here)
60. The Strength of DES(Data Encryption Standard) - Answer (click here)
61. Differential and Linear Cryptanalysis - Answer (click here)
62. Block Cipher Design Principles - Answer (click here)
63. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
64. Divisibility and the Division Algorithm - Answer (click here)
65. The Euclidean Algorithm - Answer (click here)
66. Modular Arithmetic - Answer (click here)
67. Groups, Rings, and Fields - Answer (click here)
68. Finite Fields Of The Form GF(p) - Answer (click here)
69. Polynomial Arithmetic - Answer (click here)
70. Finite Fields of the Form GF(2n) - Answer (click here)
71. Advanced Encryption Standard(AES) - Answer (click here)
72. Finite Field Arithmetic - Answer (click here)
73. AES(Advanced Encryption Standard) Structure - Answer (click here)
74. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
75. AES Key Expansion - Answer (click here)
76. An Advanced Encryption Standard(AES) Example - Answer (click here)
77. AES(Advanced Encryption Standard) Implementation - Answer (click here)
78. Block Cipher Operation - Answer (click here)
79. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
80. Electronic Code Book - Answer (click here)
81. Cipher Block Chaining(CBC) Mode - Answer (click here)
82. Cipher Feedback Mode - Answer (click here)
83. Output Feedback Mode - Answer (click here)
84. Counter Mode - Answer (click here)
85. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
86. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
87. Principles of Pseudorandom Number Generation - Answer (click here)
88. Pseudorandom Number Generators - Answer (click here)
89. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
90. Stream Ciphers - Answer (click here)
91. RC4 - Answer (click here)
92. True Random Number Generators - Answer (click here)

PART TWO ASYMMETRIC CIPHERS


Chapter 8 More Number Theory
1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)
8. Simplified Data Encryption Standard (S-DES) - Answer (click here)
9. Block Cipher Principles - Answer (click here)
10. Multiple Encryption & DES - Answer (click here)
11. Modes of Operation - Answer (click here)
12. Stream Ciphers - Answer (click here)
13. RC4 - Answer (click here)
14. Principles of Public Key Cryptography - Answer (click here)
15. RSA Algorithm - Answer (click here)
16. Diffie-Hellman Key Exchange - Answer (click here)
17. Elliptic Curve Cryptography - Answer (click here)
18. Hash Functions - Answer (click here)
19. Simple Hash Functions - Answer (click here)
20. Birthday Attacks - Answer (click here)
21. Security of Hash Functions and Macs - Answer (click here)
22. Secure Hash Algorithm - Answer (click here)
23. Digital Signatures - Answer (click here)
24. Direct Digital Signatures - Answer (click here)
25. Digital Signature Algorithm(DSA) - Answer (click here)
26. Authentication Applications - Answer (click here)
27. Kerbero V4 Authentication Dialogue Message Exchange - Answer (click
here)
28. X.509 Certificates - Answer (click here)
29. Authentication Procedures - Answer (click here)
30. Electronic Mail Security - Answer (click here)
31. Public-Key Management - Answer (click here)
32. S/MIME - Answer (click here)
33. S/MIME Functionality and Messages - Answer (click here)
34. Intruders - Answer (click here)
35. Intrusion Detection - Answer (click here)
36. Password Management - Answer (click here)
37. Firewalls: design principles, characteristics, Limitations, Types - Answer
(click here)
38. Firewall configurations - Answer (click here)
39. Trusted systems - Answer (click here)
40. Viruses And Related Threats - Answer (click here)
41. Types of Network Viruses - Answer (click here)
42. Network Virus Countermeasures - Answer (click here)
43. Concepts and Definition of Computer Security - Answer (click here)
44. The Challenges of Computer Security - Answer (click here)
45. The OSI Security Architecture - Answer (click here)
46. Security Attacks: Passive and Active Attacks - Answer (click here)
47. Security Services - Answer (click here)
48. Security Mechanisms - Answer (click here)
49. A Model For Network Security - Answer (click here)
50. Classical Encryption Techniques - Answer (click here)
51. Symmetric Cipher Model - Answer (click here)
52. Substitution Techniques - Answer (click here)
53. Transposition Techniques - Answer (click here)
54. Rotor Machines - Answer (click here)
55. Steganography - Answer (click here)
56. Block Ciphers and the Data Encryption Standard - Answer (click here)
57. Block Cipher Principles - Answer (click here)
58. The Data Encryption Standard - Answer (click here)
59. A DES(Data Encryption Standard) Example - Answer (click here)
60. The Strength of DES(Data Encryption Standard) - Answer (click here)
61. Differential and Linear Cryptanalysis - Answer (click here)
62. Block Cipher Design Principles - Answer (click here)
63. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
64. Divisibility and the Division Algorithm - Answer (click here)
65. The Euclidean Algorithm - Answer (click here)
66. Modular Arithmetic - Answer (click here)
67. Groups, Rings, and Fields - Answer (click here)
68. Finite Fields Of The Form GF(p) - Answer (click here)
69. Polynomial Arithmetic - Answer (click here)
70. Finite Fields of the Form GF(2n) - Answer (click here)
71. Advanced Encryption Standard(AES) - Answer (click here)
72. Finite Field Arithmetic - Answer (click here)
73. AES(Advanced Encryption Standard) Structure - Answer (click here)
74. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
75. AES Key Expansion - Answer (click here)
76. An Advanced Encryption Standard(AES) Example - Answer (click here)
77. AES(Advanced Encryption Standard) Implementation - Answer (click here)
78. Block Cipher Operation - Answer (click here)
79. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
80. Electronic Code Book - Answer (click here)
81. Cipher Block Chaining(CBC) Mode - Answer (click here)
82. Cipher Feedback Mode - Answer (click here)
83. Output Feedback Mode - Answer (click here)
84. Counter Mode - Answer (click here)
85. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
86. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
87. Principles of Pseudorandom Number Generation - Answer (click here)
88. Pseudorandom Number Generators - Answer (click here)
89. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
90. Stream Ciphers - Answer (click here)
91. RC4 - Answer (click here)
92. True Random Number Generators - Answer (click here)
93. Introduction to Number Theory - Answer (click here)
94. Prime Numbers - Answer (click here)
95. Fermat’s And Euler’s Theorems - Answer (click here)
96. Testing for Primality - Answer (click here)
97. The Chinese Remainder Theorem - Answer (click here)
98. Discrete Logarithms - Answer (click here)

Chapter 9 Public Key Cryptography and RSA


1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)
8. Simplified Data Encryption Standard (S-DES) - Answer (click here)
9. Block Cipher Principles - Answer (click here)
10. Multiple Encryption & DES - Answer (click here)
11. Modes of Operation - Answer (click here)
12. Stream Ciphers - Answer (click here)
13. RC4 - Answer (click here)
14. Principles of Public Key Cryptography - Answer (click here)
15. RSA Algorithm - Answer (click here)
16. Diffie-Hellman Key Exchange - Answer (click here)
17. Elliptic Curve Cryptography - Answer (click here)
18. Hash Functions - Answer (click here)
19. Simple Hash Functions - Answer (click here)
20. Birthday Attacks - Answer (click here)
21. Security of Hash Functions and Macs - Answer (click here)
22. Secure Hash Algorithm - Answer (click here)
23. Digital Signatures - Answer (click here)
24. Direct Digital Signatures - Answer (click here)
25. Digital Signature Algorithm(DSA) - Answer (click here)
26. Authentication Applications - Answer (click here)
27. Kerbero V4 Authentication Dialogue Message Exchange - Answer (click
here)
28. X.509 Certificates - Answer (click here)
29. Authentication Procedures - Answer (click here)
30. Electronic Mail Security - Answer (click here)
31. Public-Key Management - Answer (click here)
32. S/MIME - Answer (click here)
33. S/MIME Functionality and Messages - Answer (click here)
34. Intruders - Answer (click here)
35. Intrusion Detection - Answer (click here)
36. Password Management - Answer (click here)
37. Firewalls: design principles, characteristics, Limitations, Types - Answer
(click here)
38. Firewall configurations - Answer (click here)
39. Trusted systems - Answer (click here)
40. Viruses And Related Threats - Answer (click here)
41. Types of Network Viruses - Answer (click here)
42. Network Virus Countermeasures - Answer (click here)
43. Concepts and Definition of Computer Security - Answer (click here)
44. The Challenges of Computer Security - Answer (click here)
45. The OSI Security Architecture - Answer (click here)
46. Security Attacks: Passive and Active Attacks - Answer (click here)
47. Security Services - Answer (click here)
48. Security Mechanisms - Answer (click here)
49. A Model For Network Security - Answer (click here)
50. Classical Encryption Techniques - Answer (click here)
51. Symmetric Cipher Model - Answer (click here)
52. Substitution Techniques - Answer (click here)
53. Transposition Techniques - Answer (click here)
54. Rotor Machines - Answer (click here)
55. Steganography - Answer (click here)
56. Block Ciphers and the Data Encryption Standard - Answer (click here)
57. Block Cipher Principles - Answer (click here)
58. The Data Encryption Standard - Answer (click here)
59. A DES(Data Encryption Standard) Example - Answer (click here)
60. The Strength of DES(Data Encryption Standard) - Answer (click here)
61. Differential and Linear Cryptanalysis - Answer (click here)
62. Block Cipher Design Principles - Answer (click here)
63. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
64. Divisibility and the Division Algorithm - Answer (click here)
65. The Euclidean Algorithm - Answer (click here)
66. Modular Arithmetic - Answer (click here)
67. Groups, Rings, and Fields - Answer (click here)
68. Finite Fields Of The Form GF(p) - Answer (click here)
69. Polynomial Arithmetic - Answer (click here)
70. Finite Fields of the Form GF(2n) - Answer (click here)
71. Advanced Encryption Standard(AES) - Answer (click here)
72. Finite Field Arithmetic - Answer (click here)
73. AES(Advanced Encryption Standard) Structure - Answer (click here)
74. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
75. AES Key Expansion - Answer (click here)
76. An Advanced Encryption Standard(AES) Example - Answer (click here)
77. AES(Advanced Encryption Standard) Implementation - Answer (click here)
78. Block Cipher Operation - Answer (click here)
79. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
80. Electronic Code Book - Answer (click here)
81. Cipher Block Chaining(CBC) Mode - Answer (click here)
82. Cipher Feedback Mode - Answer (click here)
83. Output Feedback Mode - Answer (click here)
84. Counter Mode - Answer (click here)
85. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
86. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
87. Principles of Pseudorandom Number Generation - Answer (click here)
88. Pseudorandom Number Generators - Answer (click here)
89. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
90. Stream Ciphers - Answer (click here)
91. RC4 - Answer (click here)
92. True Random Number Generators - Answer (click here)
93. Introduction to Number Theory - Answer (click here)
94. Prime Numbers - Answer (click here)
95. Fermat’s And Euler’s Theorems - Answer (click here)
96. Testing for Primality - Answer (click here)
97. The Chinese Remainder Theorem - Answer (click here)
98. Discrete Logarithms - Answer (click here)
99. Public-Key Cryptography and RSA - Answer (click here)
100. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
101. The RSA Algorithm - Answer (click here)
102. Description of the RSA Algorithm - Answer (click here)
103. The Security of RSA - Answer (click here)

Chapter 10 Other Public Key Cryptosystems


1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)
8. Simplified Data Encryption Standard (S-DES) - Answer (click here)
9. Block Cipher Principles - Answer (click here)
10. Multiple Encryption & DES - Answer (click here)
11. Modes of Operation - Answer (click here)
12. Stream Ciphers - Answer (click here)
13. RC4 - Answer (click here)
14. Principles of Public Key Cryptography - Answer (click here)
15. RSA Algorithm - Answer (click here)
16. Diffie-Hellman Key Exchange - Answer (click here)
17. Elliptic Curve Cryptography - Answer (click here)
18. Hash Functions - Answer (click here)
19. Simple Hash Functions - Answer (click here)
20. Birthday Attacks - Answer (click here)
21. Security of Hash Functions and Macs - Answer (click here)
22. Secure Hash Algorithm - Answer (click here)
23. Digital Signatures - Answer (click here)
24. Direct Digital Signatures - Answer (click here)
25. Digital Signature Algorithm(DSA) - Answer (click here)
26. Authentication Applications - Answer (click here)
27. Kerbero V4 Authentication Dialogue Message Exchange - Answer (click
here)
28. X.509 Certificates - Answer (click here)
29. Authentication Procedures - Answer (click here)
30. Electronic Mail Security - Answer (click here)
31. Public-Key Management - Answer (click here)
32. S/MIME - Answer (click here)
33. S/MIME Functionality and Messages - Answer (click here)
34. Intruders - Answer (click here)
35. Intrusion Detection - Answer (click here)
36. Password Management - Answer (click here)
37. Firewalls: design principles, characteristics, Limitations, Types - Answer
(click here)
38. Firewall configurations - Answer (click here)
39. Trusted systems - Answer (click here)
40. Viruses And Related Threats - Answer (click here)
41. Types of Network Viruses - Answer (click here)
42. Network Virus Countermeasures - Answer (click here)
43. Concepts and Definition of Computer Security - Answer (click here)
44. The Challenges of Computer Security - Answer (click here)
45. The OSI Security Architecture - Answer (click here)
46. Security Attacks: Passive and Active Attacks - Answer (click here)
47. Security Services - Answer (click here)
48. Security Mechanisms - Answer (click here)
49. A Model For Network Security - Answer (click here)
50. Classical Encryption Techniques - Answer (click here)
51. Symmetric Cipher Model - Answer (click here)
52. Substitution Techniques - Answer (click here)
53. Transposition Techniques - Answer (click here)
54. Rotor Machines - Answer (click here)
55. Steganography - Answer (click here)
56. Block Ciphers and the Data Encryption Standard - Answer (click here)
57. Block Cipher Principles - Answer (click here)
58. The Data Encryption Standard - Answer (click here)
59. A DES(Data Encryption Standard) Example - Answer (click here)
60. The Strength of DES(Data Encryption Standard) - Answer (click here)
61. Differential and Linear Cryptanalysis - Answer (click here)
62. Block Cipher Design Principles - Answer (click here)
63. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
64. Divisibility and the Division Algorithm - Answer (click here)
65. The Euclidean Algorithm - Answer (click here)
66. Modular Arithmetic - Answer (click here)
67. Groups, Rings, and Fields - Answer (click here)
68. Finite Fields Of The Form GF(p) - Answer (click here)
69. Polynomial Arithmetic - Answer (click here)
70. Finite Fields of the Form GF(2n) - Answer (click here)
71. Advanced Encryption Standard(AES) - Answer (click here)
72. Finite Field Arithmetic - Answer (click here)
73. AES(Advanced Encryption Standard) Structure - Answer (click here)
74. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
75. AES Key Expansion - Answer (click here)
76. An Advanced Encryption Standard(AES) Example - Answer (click here)
77. AES(Advanced Encryption Standard) Implementation - Answer (click here)
78. Block Cipher Operation - Answer (click here)
79. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
80. Electronic Code Book - Answer (click here)
81. Cipher Block Chaining(CBC) Mode - Answer (click here)
82. Cipher Feedback Mode - Answer (click here)
83. Output Feedback Mode - Answer (click here)
84. Counter Mode - Answer (click here)
85. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
86. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
87. Principles of Pseudorandom Number Generation - Answer (click here)
88. Pseudorandom Number Generators - Answer (click here)
89. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
90. Stream Ciphers - Answer (click here)
91. RC4 - Answer (click here)
92. True Random Number Generators - Answer (click here)
93. Introduction to Number Theory - Answer (click here)
94. Prime Numbers - Answer (click here)
95. Fermat’s And Euler’s Theorems - Answer (click here)
96. Testing for Primality - Answer (click here)
97. The Chinese Remainder Theorem - Answer (click here)
98. Discrete Logarithms - Answer (click here)
99. Public-Key Cryptography and RSA - Answer (click here)
100. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
101. The RSA Algorithm - Answer (click here)
102. Description of the RSA Algorithm - Answer (click here)
103. The Security of RSA - Answer (click here)
104. Other Public-Key Cryptosystems - Answer (click here)
105. Diffie-Hellman Key Exchange - Answer (click here)
106. Elgamal Cryptographic System - Answer (click here)
107. Elliptic Curve Arithmetic - Answer (click here)
108. Elliptic Curve Cryptography - Answer (click here)
109. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
PART THREE CRYPTOGRAPHIC DATA INTEGRITY
ALGORITHMS
Chapter 11 Cryptographic Hash Functions
1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)
8. Simplified Data Encryption Standard (S-DES) - Answer (click here)
9. Block Cipher Principles - Answer (click here)
10. Multiple Encryption & DES - Answer (click here)
11. Modes of Operation - Answer (click here)
12. Stream Ciphers - Answer (click here)
13. RC4 - Answer (click here)
14. Principles of Public Key Cryptography - Answer (click here)
15. RSA Algorithm - Answer (click here)
16. Diffie-Hellman Key Exchange - Answer (click here)
17. Elliptic Curve Cryptography - Answer (click here)
18. Hash Functions - Answer (click here)
19. Simple Hash Functions - Answer (click here)
20. Birthday Attacks - Answer (click here)
21. Security of Hash Functions and Macs - Answer (click here)
22. Secure Hash Algorithm - Answer (click here)
23. Digital Signatures - Answer (click here)
24. Direct Digital Signatures - Answer (click here)
25. Digital Signature Algorithm(DSA) - Answer (click here)
26. Authentication Applications - Answer (click here)
27. Kerbero V4 Authentication Dialogue Message Exchange - Answer (click
here)
28. X.509 Certificates - Answer (click here)
29. Authentication Procedures - Answer (click here)
30. Electronic Mail Security - Answer (click here)
31. Public-Key Management - Answer (click here)
32. S/MIME - Answer (click here)
33. S/MIME Functionality and Messages - Answer (click here)
34. Intruders - Answer (click here)
35. Intrusion Detection - Answer (click here)
36. Password Management - Answer (click here)
37. Firewalls: design principles, characteristics, Limitations, Types - Answer
(click here)
38. Firewall configurations - Answer (click here)
39. Trusted systems - Answer (click here)
40. Viruses And Related Threats - Answer (click here)
41. Types of Network Viruses - Answer (click here)
42. Network Virus Countermeasures - Answer (click here)
43. Concepts and Definition of Computer Security - Answer (click here)
44. The Challenges of Computer Security - Answer (click here)
45. The OSI Security Architecture - Answer (click here)
46. Security Attacks: Passive and Active Attacks - Answer (click here)
47. Security Services - Answer (click here)
48. Security Mechanisms - Answer (click here)
49. A Model For Network Security - Answer (click here)
50. Classical Encryption Techniques - Answer (click here)
51. Symmetric Cipher Model - Answer (click here)
52. Substitution Techniques - Answer (click here)
53. Transposition Techniques - Answer (click here)
54. Rotor Machines - Answer (click here)
55. Steganography - Answer (click here)
56. Block Ciphers and the Data Encryption Standard - Answer (click here)
57. Block Cipher Principles - Answer (click here)
58. The Data Encryption Standard - Answer (click here)
59. A DES(Data Encryption Standard) Example - Answer (click here)
60. The Strength of DES(Data Encryption Standard) - Answer (click here)
61. Differential and Linear Cryptanalysis - Answer (click here)
62. Block Cipher Design Principles - Answer (click here)
63. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
64. Divisibility and the Division Algorithm - Answer (click here)
65. The Euclidean Algorithm - Answer (click here)
66. Modular Arithmetic - Answer (click here)
67. Groups, Rings, and Fields - Answer (click here)
68. Finite Fields Of The Form GF(p) - Answer (click here)
69. Polynomial Arithmetic - Answer (click here)
70. Finite Fields of the Form GF(2n) - Answer (click here)
71. Advanced Encryption Standard(AES) - Answer (click here)
72. Finite Field Arithmetic - Answer (click here)
73. AES(Advanced Encryption Standard) Structure - Answer (click here)
74. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
75. AES Key Expansion - Answer (click here)
76. An Advanced Encryption Standard(AES) Example - Answer (click here)
77. AES(Advanced Encryption Standard) Implementation - Answer (click here)
78. Block Cipher Operation - Answer (click here)
79. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
80. Electronic Code Book - Answer (click here)
81. Cipher Block Chaining(CBC) Mode - Answer (click here)
82. Cipher Feedback Mode - Answer (click here)
83. Output Feedback Mode - Answer (click here)
84. Counter Mode - Answer (click here)
85. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
86. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
87. Principles of Pseudorandom Number Generation - Answer (click here)
88. Pseudorandom Number Generators - Answer (click here)
89. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
90. Stream Ciphers - Answer (click here)
91. RC4 - Answer (click here)
92. True Random Number Generators - Answer (click here)
93. Introduction to Number Theory - Answer (click here)
94. Prime Numbers - Answer (click here)
95. Fermat’s And Euler’s Theorems - Answer (click here)
96. Testing for Primality - Answer (click here)
97. The Chinese Remainder Theorem - Answer (click here)
98. Discrete Logarithms - Answer (click here)
99. Public-Key Cryptography and RSA - Answer (click here)
100. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
101. The RSA Algorithm - Answer (click here)
102. Description of the RSA Algorithm - Answer (click here)
103. The Security of RSA - Answer (click here)
104. Other Public-Key Cryptosystems - Answer (click here)
105. Diffie-Hellman Key Exchange - Answer (click here)
106. Elgamal Cryptographic System - Answer (click here)
107. Elliptic Curve Arithmetic - Answer (click here)
108. Elliptic Curve Cryptography - Answer (click here)
109. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
110. Cryptographic Hash Functions - Answer (click here)
111. Applications of Cryptographic Hash Functions - Answer (click here)
112. Two Simple Hash Functions - Answer (click here)
113. Requirements and Security - Answer (click here)
114. Hash Functions Based on Cipher Block Chaining - Answer (click here)
115. Secure Hash Algorithm (SHA) - Answer (click here)
116. SHA-3 - Answer (click here)

Chapter 12 Message Authentication Codes


1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)
8. Simplified Data Encryption Standard (S-DES) - Answer (click here)
9. Block Cipher Principles - Answer (click here)
10. Multiple Encryption & DES - Answer (click here)
11. Modes of Operation - Answer (click here)
12. Stream Ciphers - Answer (click here)
13. RC4 - Answer (click here)
14. Principles of Public Key Cryptography - Answer (click here)
15. RSA Algorithm - Answer (click here)
16. Diffie-Hellman Key Exchange - Answer (click here)
17. Elliptic Curve Cryptography - Answer (click here)
18. Hash Functions - Answer (click here)
19. Simple Hash Functions - Answer (click here)
20. Birthday Attacks - Answer (click here)
21. Security of Hash Functions and Macs - Answer (click here)
22. Secure Hash Algorithm - Answer (click here)
23. Digital Signatures - Answer (click here)
24. Direct Digital Signatures - Answer (click here)
25. Digital Signature Algorithm(DSA) - Answer (click here)
26. Authentication Applications - Answer (click here)
27. Kerbero V4 Authentication Dialogue Message Exchange - Answer (click
here)
28. X.509 Certificates - Answer (click here)
29. Authentication Procedures - Answer (click here)
30. Electronic Mail Security - Answer (click here)
31. Public-Key Management - Answer (click here)
32. S/MIME - Answer (click here)
33. S/MIME Functionality and Messages - Answer (click here)
34. Intruders - Answer (click here)
35. Intrusion Detection - Answer (click here)
36. Password Management - Answer (click here)
37. Firewalls: design principles, characteristics, Limitations, Types - Answer
(click here)
38. Firewall configurations - Answer (click here)
39. Trusted systems - Answer (click here)
40. Viruses And Related Threats - Answer (click here)
41. Types of Network Viruses - Answer (click here)
42. Network Virus Countermeasures - Answer (click here)
43. Concepts and Definition of Computer Security - Answer (click here)
44. The Challenges of Computer Security - Answer (click here)
45. The OSI Security Architecture - Answer (click here)
46. Security Attacks: Passive and Active Attacks - Answer (click here)
47. Security Services - Answer (click here)
48. Security Mechanisms - Answer (click here)
49. A Model For Network Security - Answer (click here)
50. Classical Encryption Techniques - Answer (click here)
51. Symmetric Cipher Model - Answer (click here)
52. Substitution Techniques - Answer (click here)
53. Transposition Techniques - Answer (click here)
54. Rotor Machines - Answer (click here)
55. Steganography - Answer (click here)
56. Block Ciphers and the Data Encryption Standard - Answer (click here)
57. Block Cipher Principles - Answer (click here)
58. The Data Encryption Standard - Answer (click here)
59. A DES(Data Encryption Standard) Example - Answer (click here)
60. The Strength of DES(Data Encryption Standard) - Answer (click here)
61. Differential and Linear Cryptanalysis - Answer (click here)
62. Block Cipher Design Principles - Answer (click here)
63. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
64. Divisibility and the Division Algorithm - Answer (click here)
65. The Euclidean Algorithm - Answer (click here)
66. Modular Arithmetic - Answer (click here)
67. Groups, Rings, and Fields - Answer (click here)
68. Finite Fields Of The Form GF(p) - Answer (click here)
69. Polynomial Arithmetic - Answer (click here)
70. Finite Fields of the Form GF(2n) - Answer (click here)
71. Advanced Encryption Standard(AES) - Answer (click here)
72. Finite Field Arithmetic - Answer (click here)
73. AES(Advanced Encryption Standard) Structure - Answer (click here)
74. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
75. AES Key Expansion - Answer (click here)
76. An Advanced Encryption Standard(AES) Example - Answer (click here)
77. AES(Advanced Encryption Standard) Implementation - Answer (click here)
78. Block Cipher Operation - Answer (click here)
79. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
80. Electronic Code Book - Answer (click here)
81. Cipher Block Chaining(CBC) Mode - Answer (click here)
82. Cipher Feedback Mode - Answer (click here)
83. Output Feedback Mode - Answer (click here)
84. Counter Mode - Answer (click here)
85. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
86. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
87. Principles of Pseudorandom Number Generation - Answer (click here)
88. Pseudorandom Number Generators - Answer (click here)
89. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
90. Stream Ciphers - Answer (click here)
91. RC4 - Answer (click here)
92. True Random Number Generators - Answer (click here)
93. Introduction to Number Theory - Answer (click here)
94. Prime Numbers - Answer (click here)
95. Fermat’s And Euler’s Theorems - Answer (click here)
96. Testing for Primality - Answer (click here)
97. The Chinese Remainder Theorem - Answer (click here)
98. Discrete Logarithms - Answer (click here)
99. Public-Key Cryptography and RSA - Answer (click here)
100. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
101. The RSA Algorithm - Answer (click here)
102. Description of the RSA Algorithm - Answer (click here)
103. The Security of RSA - Answer (click here)
104. Other Public-Key Cryptosystems - Answer (click here)
105. Diffie-Hellman Key Exchange - Answer (click here)
106. Elgamal Cryptographic System - Answer (click here)
107. Elliptic Curve Arithmetic - Answer (click here)
108. Elliptic Curve Cryptography - Answer (click here)
109. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
110. Cryptographic Hash Functions - Answer (click here)
111. Applications of Cryptographic Hash Functions - Answer (click here)
112. Two Simple Hash Functions - Answer (click here)
113. Requirements and Security - Answer (click here)
114. Hash Functions Based on Cipher Block Chaining - Answer (click here)
115. Secure Hash Algorithm (SHA) - Answer (click here)
116. SHA-3 - Answer (click here)
117. Message Authentication Codes - Answer (click here)
118. Message Authentication Requirements - Answer (click here)
119. Message Authentication Functions - Answer (click here)
120. Requirements For Message Authentication Codes - Answer (click here)
121. Security of MACS - Answer (click here)
122. MACS Based on Hash Functions: HMAC - Answer (click here)
123. MACS Based on Block Ciphers: DAA And CMAC - Answer (click here)
124. Authenticated Encryption: CCM and GCM - Answer (click here)
125. Pseudorandom Number Generation Using Hash Functions and MACS -
Answer (click here)

Chapter 13 Digital Signatures


1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)
8. Simplified Data Encryption Standard (S-DES) - Answer (click here)
9. Block Cipher Principles - Answer (click here)
10. Multiple Encryption & DES - Answer (click here)
11. Modes of Operation - Answer (click here)
12. Stream Ciphers - Answer (click here)
13. RC4 - Answer (click here)
14. Principles of Public Key Cryptography - Answer (click here)
15. RSA Algorithm - Answer (click here)
16. Diffie-Hellman Key Exchange - Answer (click here)
17. Elliptic Curve Cryptography - Answer (click here)
18. Hash Functions - Answer (click here)
19. Simple Hash Functions - Answer (click here)
20. Birthday Attacks - Answer (click here)
21. Security of Hash Functions and Macs - Answer (click here)
22. Secure Hash Algorithm - Answer (click here)
23. Digital Signatures - Answer (click here)
24. Direct Digital Signatures - Answer (click here)
25. Digital Signature Algorithm(DSA) - Answer (click here)
26. Authentication Applications - Answer (click here)
27. Kerbero V4 Authentication Dialogue Message Exchange - Answer (click
here)
28. X.509 Certificates - Answer (click here)
29. Authentication Procedures - Answer (click here)
30. Electronic Mail Security - Answer (click here)
31. Public-Key Management - Answer (click here)
32. S/MIME - Answer (click here)
33. S/MIME Functionality and Messages - Answer (click here)
34. Intruders - Answer (click here)
35. Intrusion Detection - Answer (click here)
36. Password Management - Answer (click here)
37. Firewalls: design principles, characteristics, Limitations, Types - Answer
(click here)
38. Firewall configurations - Answer (click here)
39. Trusted systems - Answer (click here)
40. Viruses And Related Threats - Answer (click here)
41. Types of Network Viruses - Answer (click here)
42. Network Virus Countermeasures - Answer (click here)
43. Concepts and Definition of Computer Security - Answer (click here)
44. The Challenges of Computer Security - Answer (click here)
45. The OSI Security Architecture - Answer (click here)
46. Security Attacks: Passive and Active Attacks - Answer (click here)
47. Security Services - Answer (click here)
48. Security Mechanisms - Answer (click here)
49. A Model For Network Security - Answer (click here)
50. Classical Encryption Techniques - Answer (click here)
51. Symmetric Cipher Model - Answer (click here)
52. Substitution Techniques - Answer (click here)
53. Transposition Techniques - Answer (click here)
54. Rotor Machines - Answer (click here)
55. Steganography - Answer (click here)
56. Block Ciphers and the Data Encryption Standard - Answer (click here)
57. Block Cipher Principles - Answer (click here)
58. The Data Encryption Standard - Answer (click here)
59. A DES(Data Encryption Standard) Example - Answer (click here)
60. The Strength of DES(Data Encryption Standard) - Answer (click here)
61. Differential and Linear Cryptanalysis - Answer (click here)
62. Block Cipher Design Principles - Answer (click here)
63. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
64. Divisibility and the Division Algorithm - Answer (click here)
65. The Euclidean Algorithm - Answer (click here)
66. Modular Arithmetic - Answer (click here)
67. Groups, Rings, and Fields - Answer (click here)
68. Finite Fields Of The Form GF(p) - Answer (click here)
69. Polynomial Arithmetic - Answer (click here)
70. Finite Fields of the Form GF(2n) - Answer (click here)
71. Advanced Encryption Standard(AES) - Answer (click here)
72. Finite Field Arithmetic - Answer (click here)
73. AES(Advanced Encryption Standard) Structure - Answer (click here)
74. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
75. AES Key Expansion - Answer (click here)
76. An Advanced Encryption Standard(AES) Example - Answer (click here)
77. AES(Advanced Encryption Standard) Implementation - Answer (click here)
78. Block Cipher Operation - Answer (click here)
79. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
80. Electronic Code Book - Answer (click here)
81. Cipher Block Chaining(CBC) Mode - Answer (click here)
82. Cipher Feedback Mode - Answer (click here)
83. Output Feedback Mode - Answer (click here)
84. Counter Mode - Answer (click here)
85. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
86. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
87. Principles of Pseudorandom Number Generation - Answer (click here)
88. Pseudorandom Number Generators - Answer (click here)
89. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
90. Stream Ciphers - Answer (click here)
91. RC4 - Answer (click here)
92. True Random Number Generators - Answer (click here)
93. Introduction to Number Theory - Answer (click here)
94. Prime Numbers - Answer (click here)
95. Fermat’s And Euler’s Theorems - Answer (click here)
96. Testing for Primality - Answer (click here)
97. The Chinese Remainder Theorem - Answer (click here)
98. Discrete Logarithms - Answer (click here)
99. Public-Key Cryptography and RSA - Answer (click here)
100. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
101. The RSA Algorithm - Answer (click here)
102. Description of the RSA Algorithm - Answer (click here)
103. The Security of RSA - Answer (click here)
104. Other Public-Key Cryptosystems - Answer (click here)
105. Diffie-Hellman Key Exchange - Answer (click here)
106. Elgamal Cryptographic System - Answer (click here)
107. Elliptic Curve Arithmetic - Answer (click here)
108. Elliptic Curve Cryptography - Answer (click here)
109. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
110. Cryptographic Hash Functions - Answer (click here)
111. Applications of Cryptographic Hash Functions - Answer (click here)
112. Two Simple Hash Functions - Answer (click here)
113. Requirements and Security - Answer (click here)
114. Hash Functions Based on Cipher Block Chaining - Answer (click here)
115. Secure Hash Algorithm (SHA) - Answer (click here)
116. SHA-3 - Answer (click here)
117. Message Authentication Codes - Answer (click here)
118. Message Authentication Requirements - Answer (click here)
119. Message Authentication Functions - Answer (click here)
120. Requirements For Message Authentication Codes - Answer (click here)
121. Security of MACS - Answer (click here)
122. MACS Based on Hash Functions: HMAC - Answer (click here)
123. MACS Based on Block Ciphers: DAA And CMAC - Answer (click here)
124. Authenticated Encryption: CCM and GCM - Answer (click here)
125. Pseudorandom Number Generation Using Hash Functions and MACS -
Answer (click here)
126. Digital Signatures - Answer (click here)
127. Digital Signatures: Properties, Attacks and Forgeries - Answer (click here)
128. ELGAMAL Digital Signature Scheme - Answer (click here)
129. Schnorr Digital Signature Scheme - Answer (click here)
130. Digital Signature Standard - Answer (click here)

PART FOUR MUTUAL TRUST


Chapter 14 Key Management and Distribution
1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)
8. Simplified Data Encryption Standard (S-DES) - Answer (click here)
9. Block Cipher Principles - Answer (click here)
10. Multiple Encryption & DES - Answer (click here)
11. Modes of Operation - Answer (click here)
12. Stream Ciphers - Answer (click here)
13. RC4 - Answer (click here)
14. Principles of Public Key Cryptography - Answer (click here)
15. RSA Algorithm - Answer (click here)
16. Diffie-Hellman Key Exchange - Answer (click here)
17. Elliptic Curve Cryptography - Answer (click here)
18. Hash Functions - Answer (click here)
19. Simple Hash Functions - Answer (click here)
20. Birthday Attacks - Answer (click here)
21. Security of Hash Functions and Macs - Answer (click here)
22. Secure Hash Algorithm - Answer (click here)
23. Digital Signatures - Answer (click here)
24. Direct Digital Signatures - Answer (click here)
25. Digital Signature Algorithm(DSA) - Answer (click here)
26. Authentication Applications - Answer (click here)
27. Kerbero V4 Authentication Dialogue Message Exchange - Answer (click
here)
28. X.509 Certificates - Answer (click here)
29. Authentication Procedures - Answer (click here)
30. Electronic Mail Security - Answer (click here)
31. Public-Key Management - Answer (click here)
32. S/MIME - Answer (click here)
33. S/MIME Functionality and Messages - Answer (click here)
34. Intruders - Answer (click here)
35. Intrusion Detection - Answer (click here)
36. Password Management - Answer (click here)
37. Firewalls: design principles, characteristics, Limitations, Types - Answer
(click here)
38. Firewall configurations - Answer (click here)
39. Trusted systems - Answer (click here)
40. Viruses And Related Threats - Answer (click here)
41. Types of Network Viruses - Answer (click here)
42. Network Virus Countermeasures - Answer (click here)
43. Concepts and Definition of Computer Security - Answer (click here)
44. The Challenges of Computer Security - Answer (click here)
45. The OSI Security Architecture - Answer (click here)
46. Security Attacks: Passive and Active Attacks - Answer (click here)
47. Security Services - Answer (click here)
48. Security Mechanisms - Answer (click here)
49. A Model For Network Security - Answer (click here)
50. Classical Encryption Techniques - Answer (click here)
51. Symmetric Cipher Model - Answer (click here)
52. Substitution Techniques - Answer (click here)
53. Transposition Techniques - Answer (click here)
54. Rotor Machines - Answer (click here)
55. Steganography - Answer (click here)
56. Block Ciphers and the Data Encryption Standard - Answer (click here)
57. Block Cipher Principles - Answer (click here)
58. The Data Encryption Standard - Answer (click here)
59. A DES(Data Encryption Standard) Example - Answer (click here)
60. The Strength of DES(Data Encryption Standard) - Answer (click here)
61. Differential and Linear Cryptanalysis - Answer (click here)
62. Block Cipher Design Principles - Answer (click here)
63. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
64. Divisibility and the Division Algorithm - Answer (click here)
65. The Euclidean Algorithm - Answer (click here)
66. Modular Arithmetic - Answer (click here)
67. Groups, Rings, and Fields - Answer (click here)
68. Finite Fields Of The Form GF(p) - Answer (click here)
69. Polynomial Arithmetic - Answer (click here)
70. Finite Fields of the Form GF(2n) - Answer (click here)
71. Advanced Encryption Standard(AES) - Answer (click here)
72. Finite Field Arithmetic - Answer (click here)
73. AES(Advanced Encryption Standard) Structure - Answer (click here)
74. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
75. AES Key Expansion - Answer (click here)
76. An Advanced Encryption Standard(AES) Example - Answer (click here)
77. AES(Advanced Encryption Standard) Implementation - Answer (click here)
78. Block Cipher Operation - Answer (click here)
79. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
80. Electronic Code Book - Answer (click here)
81. Cipher Block Chaining(CBC) Mode - Answer (click here)
82. Cipher Feedback Mode - Answer (click here)
83. Output Feedback Mode - Answer (click here)
84. Counter Mode - Answer (click here)
85. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
86. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
87. Principles of Pseudorandom Number Generation - Answer (click here)
88. Pseudorandom Number Generators - Answer (click here)
89. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
90. Stream Ciphers - Answer (click here)
91. RC4 - Answer (click here)
92. True Random Number Generators - Answer (click here)
93. Introduction to Number Theory - Answer (click here)
94. Prime Numbers - Answer (click here)
95. Fermat’s And Euler’s Theorems - Answer (click here)
96. Testing for Primality - Answer (click here)
97. The Chinese Remainder Theorem - Answer (click here)
98. Discrete Logarithms - Answer (click here)
99. Public-Key Cryptography and RSA - Answer (click here)
100. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
101. The RSA Algorithm - Answer (click here)
102. Description of the RSA Algorithm - Answer (click here)
103. The Security of RSA - Answer (click here)
104. Other Public-Key Cryptosystems - Answer (click here)
105. Diffie-Hellman Key Exchange - Answer (click here)
106. Elgamal Cryptographic System - Answer (click here)
107. Elliptic Curve Arithmetic - Answer (click here)
108. Elliptic Curve Cryptography - Answer (click here)
109. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
110. Cryptographic Hash Functions - Answer (click here)
111. Applications of Cryptographic Hash Functions - Answer (click here)
112. Two Simple Hash Functions - Answer (click here)
113. Requirements and Security - Answer (click here)
114. Hash Functions Based on Cipher Block Chaining - Answer (click here)
115. Secure Hash Algorithm (SHA) - Answer (click here)
116. SHA-3 - Answer (click here)
117. Message Authentication Codes - Answer (click here)
118. Message Authentication Requirements - Answer (click here)
119. Message Authentication Functions - Answer (click here)
120. Requirements For Message Authentication Codes - Answer (click here)
121. Security of MACS - Answer (click here)
122. MACS Based on Hash Functions: HMAC - Answer (click here)
123. MACS Based on Block Ciphers: DAA And CMAC - Answer (click here)
124. Authenticated Encryption: CCM and GCM - Answer (click here)
125. Pseudorandom Number Generation Using Hash Functions and MACS -
Answer (click here)
126. Digital Signatures - Answer (click here)
127. Digital Signatures: Properties, Attacks and Forgeries - Answer (click here)
128. ELGAMAL Digital Signature Scheme - Answer (click here)
129. Schnorr Digital Signature Scheme - Answer (click here)
130. Digital Signature Standard - Answer (click here)
131. Key Management and Distribution - Answer (click here)
132. Symmetric Key Distribution Using Symmetric Encryption - Answer (click
here)
133. Symmetric Key Distribution Using Asymmetric Encryption - Answer
(click here)
134. Distribution of Public Keys - Answer (click here)
135. X.509 Certificates - Answer (click here)
136. Public-Key Infrastructure - Answer (click here)

Chapter 15 User Authentication Protocols


1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)
8. Simplified Data Encryption Standard (S-DES) - Answer (click here)
9. Block Cipher Principles - Answer (click here)
10. Multiple Encryption & DES - Answer (click here)
11. Modes of Operation - Answer (click here)
12. Stream Ciphers - Answer (click here)
13. RC4 - Answer (click here)
14. Principles of Public Key Cryptography - Answer (click here)
15. RSA Algorithm - Answer (click here)
16. Diffie-Hellman Key Exchange - Answer (click here)
17. Elliptic Curve Cryptography - Answer (click here)
18. Hash Functions - Answer (click here)
19. Simple Hash Functions - Answer (click here)
20. Birthday Attacks - Answer (click here)
21. Security of Hash Functions and Macs - Answer (click here)
22. Secure Hash Algorithm - Answer (click here)
23. Digital Signatures - Answer (click here)
24. Direct Digital Signatures - Answer (click here)
25. Digital Signature Algorithm(DSA) - Answer (click here)
26. Authentication Applications - Answer (click here)
27. Kerbero V4 Authentication Dialogue Message Exchange - Answer (click
here)
28. X.509 Certificates - Answer (click here)
29. Authentication Procedures - Answer (click here)
30. Electronic Mail Security - Answer (click here)
31. Public-Key Management - Answer (click here)
32. S/MIME - Answer (click here)
33. S/MIME Functionality and Messages - Answer (click here)
34. Intruders - Answer (click here)
35. Intrusion Detection - Answer (click here)
36. Password Management - Answer (click here)
37. Firewalls: design principles, characteristics, Limitations, Types - Answer
(click here)
38. Firewall configurations - Answer (click here)
39. Trusted systems - Answer (click here)
40. Viruses And Related Threats - Answer (click here)
41. Types of Network Viruses - Answer (click here)
42. Network Virus Countermeasures - Answer (click here)
43. Concepts and Definition of Computer Security - Answer (click here)
44. The Challenges of Computer Security - Answer (click here)
45. The OSI Security Architecture - Answer (click here)
46. Security Attacks: Passive and Active Attacks - Answer (click here)
47. Security Services - Answer (click here)
48. Security Mechanisms - Answer (click here)
49. A Model For Network Security - Answer (click here)
50. Classical Encryption Techniques - Answer (click here)
51. Symmetric Cipher Model - Answer (click here)
52. Substitution Techniques - Answer (click here)
53. Transposition Techniques - Answer (click here)
54. Rotor Machines - Answer (click here)
55. Steganography - Answer (click here)
56. Block Ciphers and the Data Encryption Standard - Answer (click here)
57. Block Cipher Principles - Answer (click here)
58. The Data Encryption Standard - Answer (click here)
59. A DES(Data Encryption Standard) Example - Answer (click here)
60. The Strength of DES(Data Encryption Standard) - Answer (click here)
61. Differential and Linear Cryptanalysis - Answer (click here)
62. Block Cipher Design Principles - Answer (click here)
63. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
64. Divisibility and the Division Algorithm - Answer (click here)
65. The Euclidean Algorithm - Answer (click here)
66. Modular Arithmetic - Answer (click here)
67. Groups, Rings, and Fields - Answer (click here)
68. Finite Fields Of The Form GF(p) - Answer (click here)
69. Polynomial Arithmetic - Answer (click here)
70. Finite Fields of the Form GF(2n) - Answer (click here)
71. Advanced Encryption Standard(AES) - Answer (click here)
72. Finite Field Arithmetic - Answer (click here)
73. AES(Advanced Encryption Standard) Structure - Answer (click here)
74. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
75. AES Key Expansion - Answer (click here)
76. An Advanced Encryption Standard(AES) Example - Answer (click here)
77. AES(Advanced Encryption Standard) Implementation - Answer (click here)
78. Block Cipher Operation - Answer (click here)
79. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
80. Electronic Code Book - Answer (click here)
81. Cipher Block Chaining(CBC) Mode - Answer (click here)
82. Cipher Feedback Mode - Answer (click here)
83. Output Feedback Mode - Answer (click here)
84. Counter Mode - Answer (click here)
85. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
86. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
87. Principles of Pseudorandom Number Generation - Answer (click here)
88. Pseudorandom Number Generators - Answer (click here)
89. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
90. Stream Ciphers - Answer (click here)
91. RC4 - Answer (click here)
92. True Random Number Generators - Answer (click here)
93. Introduction to Number Theory - Answer (click here)
94. Prime Numbers - Answer (click here)
95. Fermat’s And Euler’s Theorems - Answer (click here)
96. Testing for Primality - Answer (click here)
97. The Chinese Remainder Theorem - Answer (click here)
98. Discrete Logarithms - Answer (click here)
99. Public-Key Cryptography and RSA - Answer (click here)
100. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
101. The RSA Algorithm - Answer (click here)
102. Description of the RSA Algorithm - Answer (click here)
103. The Security of RSA - Answer (click here)
104. Other Public-Key Cryptosystems - Answer (click here)
105. Diffie-Hellman Key Exchange - Answer (click here)
106. Elgamal Cryptographic System - Answer (click here)
107. Elliptic Curve Arithmetic - Answer (click here)
108. Elliptic Curve Cryptography - Answer (click here)
109. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
110. Cryptographic Hash Functions - Answer (click here)
111. Applications of Cryptographic Hash Functions - Answer (click here)
112. Two Simple Hash Functions - Answer (click here)
113. Requirements and Security - Answer (click here)
114. Hash Functions Based on Cipher Block Chaining - Answer (click here)
115. Secure Hash Algorithm (SHA) - Answer (click here)
116. SHA-3 - Answer (click here)
117. Message Authentication Codes - Answer (click here)
118. Message Authentication Requirements - Answer (click here)
119. Message Authentication Functions - Answer (click here)
120. Requirements For Message Authentication Codes - Answer (click here)
121. Security of MACS - Answer (click here)
122. MACS Based on Hash Functions: HMAC - Answer (click here)
123. MACS Based on Block Ciphers: DAA And CMAC - Answer (click here)
124. Authenticated Encryption: CCM and GCM - Answer (click here)
125. Pseudorandom Number Generation Using Hash Functions and MACS -
Answer (click here)
126. Digital Signatures - Answer (click here)
127. Digital Signatures: Properties, Attacks and Forgeries - Answer (click here)
128. ELGAMAL Digital Signature Scheme - Answer (click here)
129. Schnorr Digital Signature Scheme - Answer (click here)
130. Digital Signature Standard - Answer (click here)
131. Key Management and Distribution - Answer (click here)
132. Symmetric Key Distribution Using Symmetric Encryption - Answer (click
here)
133. Symmetric Key Distribution Using Asymmetric Encryption - Answer
(click here)
134. Distribution of Public Keys - Answer (click here)
135. X.509 Certificates - Answer (click here)
136. Public-Key Infrastructure - Answer (click here)
137. User Authentication - Answer (click here)
138. Remote User-Authentication Principles - Answer (click here)
139. Remote User-Authentication Using Symmetric Encryption - Answer (click
here)
140. Kerberos - Answer (click here)
141. Remote User Authentication Using Asymmetric Encryption - Answer
(click here)
142. Federated Identity Management - Answer (click here)

PART FIVE NETWORK AND INTERNET SECURITY


Chapter 16 Transport Level Security
1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)
8. Simplified Data Encryption Standard (S-DES) - Answer (click here)
9. Block Cipher Principles - Answer (click here)
10. Multiple Encryption & DES - Answer (click here)
11. Modes of Operation - Answer (click here)
12. Stream Ciphers - Answer (click here)
13. RC4 - Answer (click here)
14. Principles of Public Key Cryptography - Answer (click here)
15. RSA Algorithm - Answer (click here)
16. Diffie-Hellman Key Exchange - Answer (click here)
17. Elliptic Curve Cryptography - Answer (click here)
18. Hash Functions - Answer (click here)
19. Simple Hash Functions - Answer (click here)
20. Birthday Attacks - Answer (click here)
21. Security of Hash Functions and Macs - Answer (click here)
22. Secure Hash Algorithm - Answer (click here)
23. Digital Signatures - Answer (click here)
24. Direct Digital Signatures - Answer (click here)
25. Digital Signature Algorithm(DSA) - Answer (click here)
26. Authentication Applications - Answer (click here)
27. Kerbero V4 Authentication Dialogue Message Exchange - Answer (click
here)
28. X.509 Certificates - Answer (click here)
29. Authentication Procedures - Answer (click here)
30. Electronic Mail Security - Answer (click here)
31. Public-Key Management - Answer (click here)
32. S/MIME - Answer (click here)
33. S/MIME Functionality and Messages - Answer (click here)
34. Intruders - Answer (click here)
35. Intrusion Detection - Answer (click here)
36. Password Management - Answer (click here)
37. Firewalls: design principles, characteristics, Limitations, Types - Answer
(click here)
38. Firewall configurations - Answer (click here)
39. Trusted systems - Answer (click here)
40. Viruses And Related Threats - Answer (click here)
41. Types of Network Viruses - Answer (click here)
42. Network Virus Countermeasures - Answer (click here)
43. Concepts and Definition of Computer Security - Answer (click here)
44. The Challenges of Computer Security - Answer (click here)
45. The OSI Security Architecture - Answer (click here)
46. Security Attacks: Passive and Active Attacks - Answer (click here)
47. Security Services - Answer (click here)
48. Security Mechanisms - Answer (click here)
49. A Model For Network Security - Answer (click here)
50. Classical Encryption Techniques - Answer (click here)
51. Symmetric Cipher Model - Answer (click here)
52. Substitution Techniques - Answer (click here)
53. Transposition Techniques - Answer (click here)
54. Rotor Machines - Answer (click here)
55. Steganography - Answer (click here)
56. Block Ciphers and the Data Encryption Standard - Answer (click here)
57. Block Cipher Principles - Answer (click here)
58. The Data Encryption Standard - Answer (click here)
59. A DES(Data Encryption Standard) Example - Answer (click here)
60. The Strength of DES(Data Encryption Standard) - Answer (click here)
61. Differential and Linear Cryptanalysis - Answer (click here)
62. Block Cipher Design Principles - Answer (click here)
63. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
64. Divisibility and the Division Algorithm - Answer (click here)
65. The Euclidean Algorithm - Answer (click here)
66. Modular Arithmetic - Answer (click here)
67. Groups, Rings, and Fields - Answer (click here)
68. Finite Fields Of The Form GF(p) - Answer (click here)
69. Polynomial Arithmetic - Answer (click here)
70. Finite Fields of the Form GF(2n) - Answer (click here)
71. Advanced Encryption Standard(AES) - Answer (click here)
72. Finite Field Arithmetic - Answer (click here)
73. AES(Advanced Encryption Standard) Structure - Answer (click here)
74. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
75. AES Key Expansion - Answer (click here)
76. An Advanced Encryption Standard(AES) Example - Answer (click here)
77. AES(Advanced Encryption Standard) Implementation - Answer (click here)
78. Block Cipher Operation - Answer (click here)
79. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
80. Electronic Code Book - Answer (click here)
81. Cipher Block Chaining(CBC) Mode - Answer (click here)
82. Cipher Feedback Mode - Answer (click here)
83. Output Feedback Mode - Answer (click here)
84. Counter Mode - Answer (click here)
85. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
86. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
87. Principles of Pseudorandom Number Generation - Answer (click here)
88. Pseudorandom Number Generators - Answer (click here)
89. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
90. Stream Ciphers - Answer (click here)
91. RC4 - Answer (click here)
92. True Random Number Generators - Answer (click here)
93. Introduction to Number Theory - Answer (click here)
94. Prime Numbers - Answer (click here)
95. Fermat’s And Euler’s Theorems - Answer (click here)
96. Testing for Primality - Answer (click here)
97. The Chinese Remainder Theorem - Answer (click here)
98. Discrete Logarithms - Answer (click here)
99. Public-Key Cryptography and RSA - Answer (click here)
100. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
101. The RSA Algorithm - Answer (click here)
102. Description of the RSA Algorithm - Answer (click here)
103. The Security of RSA - Answer (click here)
104. Other Public-Key Cryptosystems - Answer (click here)
105. Diffie-Hellman Key Exchange - Answer (click here)
106. Elgamal Cryptographic System - Answer (click here)
107. Elliptic Curve Arithmetic - Answer (click here)
108. Elliptic Curve Cryptography - Answer (click here)
109. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
110. Cryptographic Hash Functions - Answer (click here)
111. Applications of Cryptographic Hash Functions - Answer (click here)
112. Two Simple Hash Functions - Answer (click here)
113. Requirements and Security - Answer (click here)
114. Hash Functions Based on Cipher Block Chaining - Answer (click here)
115. Secure Hash Algorithm (SHA) - Answer (click here)
116. SHA-3 - Answer (click here)
117. Message Authentication Codes - Answer (click here)
118. Message Authentication Requirements - Answer (click here)
119. Message Authentication Functions - Answer (click here)
120. Requirements For Message Authentication Codes - Answer (click here)
121. Security of MACS - Answer (click here)
122. MACS Based on Hash Functions: HMAC - Answer (click here)
123. MACS Based on Block Ciphers: DAA And CMAC - Answer (click here)
124. Authenticated Encryption: CCM and GCM - Answer (click here)
125. Pseudorandom Number Generation Using Hash Functions and MACS -
Answer (click here)
126. Digital Signatures - Answer (click here)
127. Digital Signatures: Properties, Attacks and Forgeries - Answer (click here)
128. ELGAMAL Digital Signature Scheme - Answer (click here)
129. Schnorr Digital Signature Scheme - Answer (click here)
130. Digital Signature Standard - Answer (click here)
131. Key Management and Distribution - Answer (click here)
132. Symmetric Key Distribution Using Symmetric Encryption - Answer (click
here)
133. Symmetric Key Distribution Using Asymmetric Encryption - Answer
(click here)
134. Distribution of Public Keys - Answer (click here)
135. X.509 Certificates - Answer (click here)
136. Public-Key Infrastructure - Answer (click here)
137. User Authentication - Answer (click here)
138. Remote User-Authentication Principles - Answer (click here)
139. Remote User-Authentication Using Symmetric Encryption - Answer (click
here)
140. Kerberos - Answer (click here)
141. Remote User Authentication Using Asymmetric Encryption - Answer
(click here)
142. Federated Identity Management - Answer (click here)
143. Transport-Level Security - Answer (click here)
144. Web Security Considerations - Answer (click here)
145. Secure Socket Layer and Transport Layer Security - Answer (click here)
146. Transport Layer Security - Answer (click here)
147. HTTPS - Answer (click here)
148. Secure Shell (SSH) - Answer (click here)

Chapter 17 Wireless Network Security


1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)
8. Simplified Data Encryption Standard (S-DES) - Answer (click here)
9. Block Cipher Principles - Answer (click here)
10. Multiple Encryption & DES - Answer (click here)
11. Modes of Operation - Answer (click here)
12. Stream Ciphers - Answer (click here)
13. RC4 - Answer (click here)
14. Principles of Public Key Cryptography - Answer (click here)
15. RSA Algorithm - Answer (click here)
16. Diffie-Hellman Key Exchange - Answer (click here)
17. Elliptic Curve Cryptography - Answer (click here)
18. Hash Functions - Answer (click here)
19. Simple Hash Functions - Answer (click here)
20. Birthday Attacks - Answer (click here)
21. Security of Hash Functions and Macs - Answer (click here)
22. Secure Hash Algorithm - Answer (click here)
23. Digital Signatures - Answer (click here)
24. Direct Digital Signatures - Answer (click here)
25. Digital Signature Algorithm(DSA) - Answer (click here)
26. Authentication Applications - Answer (click here)
27. Kerbero V4 Authentication Dialogue Message Exchange - Answer (click
here)
28. X.509 Certificates - Answer (click here)
29. Authentication Procedures - Answer (click here)
30. Electronic Mail Security - Answer (click here)
31. Public-Key Management - Answer (click here)
32. S/MIME - Answer (click here)
33. S/MIME Functionality and Messages - Answer (click here)
34. Intruders - Answer (click here)
35. Intrusion Detection - Answer (click here)
36. Password Management - Answer (click here)
37. Firewalls: design principles, characteristics, Limitations, Types - Answer
(click here)
38. Firewall configurations - Answer (click here)
39. Trusted systems - Answer (click here)
40. Viruses And Related Threats - Answer (click here)
41. Types of Network Viruses - Answer (click here)
42. Network Virus Countermeasures - Answer (click here)
43. Concepts and Definition of Computer Security - Answer (click here)
44. The Challenges of Computer Security - Answer (click here)
45. The OSI Security Architecture - Answer (click here)
46. Security Attacks: Passive and Active Attacks - Answer (click here)
47. Security Services - Answer (click here)
48. Security Mechanisms - Answer (click here)
49. A Model For Network Security - Answer (click here)
50. Classical Encryption Techniques - Answer (click here)
51. Symmetric Cipher Model - Answer (click here)
52. Substitution Techniques - Answer (click here)
53. Transposition Techniques - Answer (click here)
54. Rotor Machines - Answer (click here)
55. Steganography - Answer (click here)
56. Block Ciphers and the Data Encryption Standard - Answer (click here)
57. Block Cipher Principles - Answer (click here)
58. The Data Encryption Standard - Answer (click here)
59. A DES(Data Encryption Standard) Example - Answer (click here)
60. The Strength of DES(Data Encryption Standard) - Answer (click here)
61. Differential and Linear Cryptanalysis - Answer (click here)
62. Block Cipher Design Principles - Answer (click here)
63. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
64. Divisibility and the Division Algorithm - Answer (click here)
65. The Euclidean Algorithm - Answer (click here)
66. Modular Arithmetic - Answer (click here)
67. Groups, Rings, and Fields - Answer (click here)
68. Finite Fields Of The Form GF(p) - Answer (click here)
69. Polynomial Arithmetic - Answer (click here)
70. Finite Fields of the Form GF(2n) - Answer (click here)
71. Advanced Encryption Standard(AES) - Answer (click here)
72. Finite Field Arithmetic - Answer (click here)
73. AES(Advanced Encryption Standard) Structure - Answer (click here)
74. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
75. AES Key Expansion - Answer (click here)
76. An Advanced Encryption Standard(AES) Example - Answer (click here)
77. AES(Advanced Encryption Standard) Implementation - Answer (click here)
78. Block Cipher Operation - Answer (click here)
79. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
80. Electronic Code Book - Answer (click here)
81. Cipher Block Chaining(CBC) Mode - Answer (click here)
82. Cipher Feedback Mode - Answer (click here)
83. Output Feedback Mode - Answer (click here)
84. Counter Mode - Answer (click here)
85. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
86. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
87. Principles of Pseudorandom Number Generation - Answer (click here)
88. Pseudorandom Number Generators - Answer (click here)
89. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
90. Stream Ciphers - Answer (click here)
91. RC4 - Answer (click here)
92. True Random Number Generators - Answer (click here)
93. Introduction to Number Theory - Answer (click here)
94. Prime Numbers - Answer (click here)
95. Fermat’s And Euler’s Theorems - Answer (click here)
96. Testing for Primality - Answer (click here)
97. The Chinese Remainder Theorem - Answer (click here)
98. Discrete Logarithms - Answer (click here)
99. Public-Key Cryptography and RSA - Answer (click here)
100. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
101. The RSA Algorithm - Answer (click here)
102. Description of the RSA Algorithm - Answer (click here)
103. The Security of RSA - Answer (click here)
104. Other Public-Key Cryptosystems - Answer (click here)
105. Diffie-Hellman Key Exchange - Answer (click here)
106. Elgamal Cryptographic System - Answer (click here)
107. Elliptic Curve Arithmetic - Answer (click here)
108. Elliptic Curve Cryptography - Answer (click here)
109. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
110. Cryptographic Hash Functions - Answer (click here)
111. Applications of Cryptographic Hash Functions - Answer (click here)
112. Two Simple Hash Functions - Answer (click here)
113. Requirements and Security - Answer (click here)
114. Hash Functions Based on Cipher Block Chaining - Answer (click here)
115. Secure Hash Algorithm (SHA) - Answer (click here)
116. SHA-3 - Answer (click here)
117. Message Authentication Codes - Answer (click here)
118. Message Authentication Requirements - Answer (click here)
119. Message Authentication Functions - Answer (click here)
120. Requirements For Message Authentication Codes - Answer (click here)
121. Security of MACS - Answer (click here)
122. MACS Based on Hash Functions: HMAC - Answer (click here)
123. MACS Based on Block Ciphers: DAA And CMAC - Answer (click here)
124. Authenticated Encryption: CCM and GCM - Answer (click here)
125. Pseudorandom Number Generation Using Hash Functions and MACS -
Answer (click here)
126. Digital Signatures - Answer (click here)
127. Digital Signatures: Properties, Attacks and Forgeries - Answer (click here)
128. ELGAMAL Digital Signature Scheme - Answer (click here)
129. Schnorr Digital Signature Scheme - Answer (click here)
130. Digital Signature Standard - Answer (click here)
131. Key Management and Distribution - Answer (click here)
132. Symmetric Key Distribution Using Symmetric Encryption - Answer (click
here)
133. Symmetric Key Distribution Using Asymmetric Encryption - Answer
(click here)
134. Distribution of Public Keys - Answer (click here)
135. X.509 Certificates - Answer (click here)
136. Public-Key Infrastructure - Answer (click here)
137. User Authentication - Answer (click here)
138. Remote User-Authentication Principles - Answer (click here)
139. Remote User-Authentication Using Symmetric Encryption - Answer (click
here)
140. Kerberos - Answer (click here)
141. Remote User Authentication Using Asymmetric Encryption - Answer
(click here)
142. Federated Identity Management - Answer (click here)
143. Transport-Level Security - Answer (click here)
144. Web Security Considerations - Answer (click here)
145. Secure Socket Layer and Transport Layer Security - Answer (click here)
146. Transport Layer Security - Answer (click here)
147. HTTPS - Answer (click here)
148. Secure Shell (SSH) - Answer (click here)
1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)
8. Simplified Data Encryption Standard (S-DES) - Answer (click here)
9. Block Cipher Principles - Answer (click here)
10. Multiple Encryption & DES - Answer (click here)
11. Modes of Operation - Answer (click here)
12. Stream Ciphers - Answer (click here)
13. RC4 - Answer (click here)
14. Principles of Public Key Cryptography - Answer (click here)
15. RSA Algorithm - Answer (click here)
16. Diffie-Hellman Key Exchange - Answer (click here)
17. Elliptic Curve Cryptography - Answer (click here)
18. Hash Functions - Answer (click here)
19. Simple Hash Functions - Answer (click here)
20. Birthday Attacks - Answer (click here)
21. Security of Hash Functions and Macs - Answer (click here)
22. Secure Hash Algorithm - Answer (click here)
23. Digital Signatures - Answer (click here)
24. Direct Digital Signatures - Answer (click here)
25. Digital Signature Algorithm(DSA) - Answer (click here)
26. Authentication Applications - Answer (click here)
27. Kerbero V4 Authentication Dialogue Message Exchange - Answer (click
here)
28. X.509 Certificates - Answer (click here)
29. Authentication Procedures - Answer (click here)
30. Electronic Mail Security - Answer (click here)
31. Public-Key Management - Answer (click here)
32. S/MIME - Answer (click here)
33. S/MIME Functionality and Messages - Answer (click here)
34. Intruders - Answer (click here)
35. Intrusion Detection - Answer (click here)
36. Password Management - Answer (click here)
37. Firewalls: design principles, characteristics, Limitations, Types - Answer
(click here)
38. Firewall configurations - Answer (click here)
39. Trusted systems - Answer (click here)
40. Viruses And Related Threats - Answer (click here)
41. Types of Network Viruses - Answer (click here)
42. Network Virus Countermeasures - Answer (click here)
43. Concepts and Definition of Computer Security - Answer (click here)
44. The Challenges of Computer Security - Answer (click here)
45. The OSI Security Architecture - Answer (click here)
46. Security Attacks: Passive and Active Attacks - Answer (click here)
47. Security Services - Answer (click here)
48. Security Mechanisms - Answer (click here)
49. A Model For Network Security - Answer (click here)
50. Classical Encryption Techniques - Answer (click here)
51. Symmetric Cipher Model - Answer (click here)
52. Substitution Techniques - Answer (click here)
53. Transposition Techniques - Answer (click here)
54. Rotor Machines - Answer (click here)
55. Steganography - Answer (click here)
56. Block Ciphers and the Data Encryption Standard - Answer (click here)
57. Block Cipher Principles - Answer (click here)
58. The Data Encryption Standard - Answer (click here)
59. A DES(Data Encryption Standard) Example - Answer (click here)
60. The Strength of DES(Data Encryption Standard) - Answer (click here)
61. Differential and Linear Cryptanalysis - Answer (click here)
62. Block Cipher Design Principles - Answer (click here)
63. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
64. Divisibility and the Division Algorithm - Answer (click here)
65. The Euclidean Algorithm - Answer (click here)
66. Modular Arithmetic - Answer (click here)
67. Groups, Rings, and Fields - Answer (click here)
68. Finite Fields Of The Form GF(p) - Answer (click here)
69. Polynomial Arithmetic - Answer (click here)
70. Finite Fields of the Form GF(2n) - Answer (click here)
71. Advanced Encryption Standard(AES) - Answer (click here)
72. Finite Field Arithmetic - Answer (click here)
73. AES(Advanced Encryption Standard) Structure - Answer (click here)
74. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
75. AES Key Expansion - Answer (click here)
76. An Advanced Encryption Standard(AES) Example - Answer (click here)
77. AES(Advanced Encryption Standard) Implementation - Answer (click here)
78. Block Cipher Operation - Answer (click here)
79. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
80. Electronic Code Book - Answer (click here)
81. Cipher Block Chaining(CBC) Mode - Answer (click here)
82. Cipher Feedback Mode - Answer (click here)
83. Output Feedback Mode - Answer (click here)
84. Counter Mode - Answer (click here)
85. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
86. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
87. Principles of Pseudorandom Number Generation - Answer (click here)
88. Pseudorandom Number Generators - Answer (click here)
89. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
90. Stream Ciphers - Answer (click here)
91. RC4 - Answer (click here)
92. True Random Number Generators - Answer (click here)
93. Introduction to Number Theory - Answer (click here)
94. Prime Numbers - Answer (click here)
95. Fermat’s And Euler’s Theorems - Answer (click here)
96. Testing for Primality - Answer (click here)
97. The Chinese Remainder Theorem - Answer (click here)
98. Discrete Logarithms - Answer (click here)
99. Public-Key Cryptography and RSA - Answer (click here)
100. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
101. The RSA Algorithm - Answer (click here)
102. Description of the RSA Algorithm - Answer (click here)
103. The Security of RSA - Answer (click here)
104. Other Public-Key Cryptosystems - Answer (click here)
105. Diffie-Hellman Key Exchange - Answer (click here)
106. Elgamal Cryptographic System - Answer (click here)
107. Elliptic Curve Arithmetic - Answer (click here)
108. Elliptic Curve Cryptography - Answer (click here)
109. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
110. Cryptographic Hash Functions - Answer (click here)
111. Applications of Cryptographic Hash Functions - Answer (click here)
112. Two Simple Hash Functions - Answer (click here)
113. Requirements and Security - Answer (click here)
114. Hash Functions Based on Cipher Block Chaining - Answer (click here)
115. Secure Hash Algorithm (SHA) - Answer (click here)
116. SHA-3 - Answer (click here)
117. Message Authentication Codes - Answer (click here)
118. Message Authentication Requirements - Answer (click here)
119. Message Authentication Functions - Answer (click here)
120. Requirements For Message Authentication Codes - Answer (click here)
121. Security of MACS - Answer (click here)
122. MACS Based on Hash Functions: HMAC - Answer (click here)
123. MACS Based on Block Ciphers: DAA And CMAC - Answer (click here)
124. Authenticated Encryption: CCM and GCM - Answer (click here)
125. Pseudorandom Number Generation Using Hash Functions and MACS -
Answer (click here)
126. Digital Signatures - Answer (click here)
127. Digital Signatures: Properties, Attacks and Forgeries - Answer (click here)
128. ELGAMAL Digital Signature Scheme - Answer (click here)
129. Schnorr Digital Signature Scheme - Answer (click here)
130. Digital Signature Standard - Answer (click here)
131. Key Management and Distribution - Answer (click here)
132. Symmetric Key Distribution Using Symmetric Encryption - Answer (click
here)
133. Symmetric Key Distribution Using Asymmetric Encryption - Answer
(click here)
134. Distribution of Public Keys - Answer (click here)
135. X.509 Certificates - Answer (click here)
136. Public-Key Infrastructure - Answer (click here)
137. User Authentication - Answer (click here)
138. Remote User-Authentication Principles - Answer (click here)
139. Remote User-Authentication Using Symmetric Encryption - Answer (click
here)
140. Kerberos - Answer (click here)
141. Remote User Authentication Using Asymmetric Encryption - Answer
(click here)
142. Federated Identity Management - Answer (click here)
143. Transport-Level Security - Answer (click here)
144. Web Security Considerations - Answer (click here)
145. Secure Socket Layer and Transport Layer Security - Answer (click here)
146. Transport Layer Security - Answer (click here)
147. HTTPS - Answer (click here)
148. Secure Shell (SSH) - Answer (click here)
149. Wireless Network Security - Answer (click here)
150. IEEE 802.11 Wireless LAN Overview: Wi-Fi Alliance, Protocol
Architecture, Network Components - Answer (click here)
151. IEEE 802.11i Wireless LAN Security - Answer (click here)
152. Wireless Application Protocol Overview - Answer (click here)
153. Wireless Transport Layer Security - Answer (click here)
154. WAP End-to-End Security - Answer (click here)

Chapter 18 Electronic Mail Security


1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)
8. Simplified Data Encryption Standard (S-DES) - Answer (click here)
9. Block Cipher Principles - Answer (click here)
10. Multiple Encryption & DES - Answer (click here)
11. Modes of Operation - Answer (click here)
12. Stream Ciphers - Answer (click here)
13. RC4 - Answer (click here)
14. Principles of Public Key Cryptography - Answer (click here)
15. RSA Algorithm - Answer (click here)
16. Diffie-Hellman Key Exchange - Answer (click here)
17. Elliptic Curve Cryptography - Answer (click here)
18. Hash Functions - Answer (click here)
19. Simple Hash Functions - Answer (click here)
20. Birthday Attacks - Answer (click here)
21. Security of Hash Functions and Macs - Answer (click here)
22. Secure Hash Algorithm - Answer (click here)
23. Digital Signatures - Answer (click here)
24. Direct Digital Signatures - Answer (click here)
25. Digital Signature Algorithm(DSA) - Answer (click here)
26. Authentication Applications - Answer (click here)
27. Kerbero V4 Authentication Dialogue Message Exchange - Answer (click
here)
28. X.509 Certificates - Answer (click here)
29. Authentication Procedures - Answer (click here)
30. Electronic Mail Security - Answer (click here)
31. Public-Key Management - Answer (click here)
32. S/MIME - Answer (click here)
33. S/MIME Functionality and Messages - Answer (click here)
34. Intruders - Answer (click here)
35. Intrusion Detection - Answer (click here)
36. Password Management - Answer (click here)
37. Firewalls: design principles, characteristics, Limitations, Types - Answer
(click here)
38. Firewall configurations - Answer (click here)
39. Trusted systems - Answer (click here)
40. Viruses And Related Threats - Answer (click here)
41. Types of Network Viruses - Answer (click here)
42. Network Virus Countermeasures - Answer (click here)
43. Concepts and Definition of Computer Security - Answer (click here)
44. The Challenges of Computer Security - Answer (click here)
45. The OSI Security Architecture - Answer (click here)
46. Security Attacks: Passive and Active Attacks - Answer (click here)
47. Security Services - Answer (click here)
48. Security Mechanisms - Answer (click here)
49. A Model For Network Security - Answer (click here)
50. Classical Encryption Techniques - Answer (click here)
51. Symmetric Cipher Model - Answer (click here)
52. Substitution Techniques - Answer (click here)
53. Transposition Techniques - Answer (click here)
54. Rotor Machines - Answer (click here)
55. Steganography - Answer (click here)
56. Block Ciphers and the Data Encryption Standard - Answer (click here)
57. Block Cipher Principles - Answer (click here)
58. The Data Encryption Standard - Answer (click here)
59. A DES(Data Encryption Standard) Example - Answer (click here)
60. The Strength of DES(Data Encryption Standard) - Answer (click here)
61. Differential and Linear Cryptanalysis - Answer (click here)
62. Block Cipher Design Principles - Answer (click here)
63. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
64. Divisibility and the Division Algorithm - Answer (click here)
65. The Euclidean Algorithm - Answer (click here)
66. Modular Arithmetic - Answer (click here)
67. Groups, Rings, and Fields - Answer (click here)
68. Finite Fields Of The Form GF(p) - Answer (click here)
69. Polynomial Arithmetic - Answer (click here)
70. Finite Fields of the Form GF(2n) - Answer (click here)
71. Advanced Encryption Standard(AES) - Answer (click here)
72. Finite Field Arithmetic - Answer (click here)
73. AES(Advanced Encryption Standard) Structure - Answer (click here)
74. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
75. AES Key Expansion - Answer (click here)
76. An Advanced Encryption Standard(AES) Example - Answer (click here)
77. AES(Advanced Encryption Standard) Implementation - Answer (click here)
78. Block Cipher Operation - Answer (click here)
79. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
80. Electronic Code Book - Answer (click here)
81. Cipher Block Chaining(CBC) Mode - Answer (click here)
82. Cipher Feedback Mode - Answer (click here)
83. Output Feedback Mode - Answer (click here)
84. Counter Mode - Answer (click here)
85. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
86. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
87. Principles of Pseudorandom Number Generation - Answer (click here)
88. Pseudorandom Number Generators - Answer (click here)
89. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
90. Stream Ciphers - Answer (click here)
91. RC4 - Answer (click here)
92. True Random Number Generators - Answer (click here)
93. Introduction to Number Theory - Answer (click here)
94. Prime Numbers - Answer (click here)
95. Fermat’s And Euler’s Theorems - Answer (click here)
96. Testing for Primality - Answer (click here)
97. The Chinese Remainder Theorem - Answer (click here)
98. Discrete Logarithms - Answer (click here)
99. Public-Key Cryptography and RSA - Answer (click here)
100. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
101. The RSA Algorithm - Answer (click here)
102. Description of the RSA Algorithm - Answer (click here)
103. The Security of RSA - Answer (click here)
104. Other Public-Key Cryptosystems - Answer (click here)
105. Diffie-Hellman Key Exchange - Answer (click here)
106. Elgamal Cryptographic System - Answer (click here)
107. Elliptic Curve Arithmetic - Answer (click here)
108. Elliptic Curve Cryptography - Answer (click here)
109. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
110. Cryptographic Hash Functions - Answer (click here)
111. Applications of Cryptographic Hash Functions - Answer (click here)
112. Two Simple Hash Functions - Answer (click here)
113. Requirements and Security - Answer (click here)
114. Hash Functions Based on Cipher Block Chaining - Answer (click here)
115. Secure Hash Algorithm (SHA) - Answer (click here)
116. SHA-3 - Answer (click here)
117. Message Authentication Codes - Answer (click here)
118. Message Authentication Requirements - Answer (click here)
119. Message Authentication Functions - Answer (click here)
120. Requirements For Message Authentication Codes - Answer (click here)
121. Security of MACS - Answer (click here)
122. MACS Based on Hash Functions: HMAC - Answer (click here)
123. MACS Based on Block Ciphers: DAA And CMAC - Answer (click here)
124. Authenticated Encryption: CCM and GCM - Answer (click here)
125. Pseudorandom Number Generation Using Hash Functions and MACS -
Answer (click here)
126. Digital Signatures - Answer (click here)
127. Digital Signatures: Properties, Attacks and Forgeries - Answer (click here)
128. ELGAMAL Digital Signature Scheme - Answer (click here)
129. Schnorr Digital Signature Scheme - Answer (click here)
130. Digital Signature Standard - Answer (click here)
131. Key Management and Distribution - Answer (click here)
132. Symmetric Key Distribution Using Symmetric Encryption - Answer (click
here)
133. Symmetric Key Distribution Using Asymmetric Encryption - Answer
(click here)
134. Distribution of Public Keys - Answer (click here)
135. X.509 Certificates - Answer (click here)
136. Public-Key Infrastructure - Answer (click here)
137. User Authentication - Answer (click here)
138. Remote User-Authentication Principles - Answer (click here)
139. Remote User-Authentication Using Symmetric Encryption - Answer (click
here)
140. Kerberos - Answer (click here)
141. Remote User Authentication Using Asymmetric Encryption - Answer
(click here)
142. Federated Identity Management - Answer (click here)
143. Transport-Level Security - Answer (click here)
144. Web Security Considerations - Answer (click here)
145. Secure Socket Layer and Transport Layer Security - Answer (click here)
146. Transport Layer Security - Answer (click here)
147. HTTPS - Answer (click here)
148. Secure Shell (SSH) - Answer (click here)
149. Wireless Network Security - Answer (click here)
150. IEEE 802.11 Wireless LAN Overview: Wi-Fi Alliance, Protocol
Architecture, Network Components - Answer (click here)
151. IEEE 802.11i Wireless LAN Security - Answer (click here)
152. Wireless Application Protocol Overview - Answer (click here)
153. Wireless Transport Layer Security - Answer (click here)
154. WAP End-to-End Security - Answer (click here)
155. Electronic Mail Security - Answer (click here)
156. Pretty Good Privacy - Answer (click here)
157. S/MIME - Answer (click here)
158. DomainKeys Identified Mail - Answer (click here)

Chapter 19 IP Security
1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)
8. Simplified Data Encryption Standard (S-DES) - Answer (click here)
9. Block Cipher Principles - Answer (click here)
10. Multiple Encryption & DES - Answer (click here)
11. Modes of Operation - Answer (click here)
12. Stream Ciphers - Answer (click here)
13. RC4 - Answer (click here)
14. Principles of Public Key Cryptography - Answer (click here)
15. RSA Algorithm - Answer (click here)
16. Diffie-Hellman Key Exchange - Answer (click here)
17. Elliptic Curve Cryptography - Answer (click here)
18. Hash Functions - Answer (click here)
19. Simple Hash Functions - Answer (click here)
20. Birthday Attacks - Answer (click here)
21. Security of Hash Functions and Macs - Answer (click here)
22. Secure Hash Algorithm - Answer (click here)
23. Digital Signatures - Answer (click here)
24. Direct Digital Signatures - Answer (click here)
25. Digital Signature Algorithm(DSA) - Answer (click here)
26. Authentication Applications - Answer (click here)
27. Kerbero V4 Authentication Dialogue Message Exchange - Answer (click
here)
28. X.509 Certificates - Answer (click here)
29. Authentication Procedures - Answer (click here)
30. Electronic Mail Security - Answer (click here)
31. Public-Key Management - Answer (click here)
32. S/MIME - Answer (click here)
33. S/MIME Functionality and Messages - Answer (click here)
34. Intruders - Answer (click here)
35. Intrusion Detection - Answer (click here)
36. Password Management - Answer (click here)
37. Firewalls: design principles, characteristics, Limitations, Types - Answer
(click here)
38. Firewall configurations - Answer (click here)
39. Trusted systems - Answer (click here)
40. Viruses And Related Threats - Answer (click here)
41. Types of Network Viruses - Answer (click here)
42. Network Virus Countermeasures - Answer (click here)
43. Concepts and Definition of Computer Security - Answer (click here)
44. The Challenges of Computer Security - Answer (click here)
45. The OSI Security Architecture - Answer (click here)
46. Security Attacks: Passive and Active Attacks - Answer (click here)
47. Security Services - Answer (click here)
48. Security Mechanisms - Answer (click here)
49. A Model For Network Security - Answer (click here)
50. Classical Encryption Techniques - Answer (click here)
51. Symmetric Cipher Model - Answer (click here)
52. Substitution Techniques - Answer (click here)
53. Transposition Techniques - Answer (click here)
54. Rotor Machines - Answer (click here)
55. Steganography - Answer (click here)
56. Block Ciphers and the Data Encryption Standard - Answer (click here)
57. Block Cipher Principles - Answer (click here)
58. The Data Encryption Standard - Answer (click here)
59. A DES(Data Encryption Standard) Example - Answer (click here)
60. The Strength of DES(Data Encryption Standard) - Answer (click here)
61. Differential and Linear Cryptanalysis - Answer (click here)
62. Block Cipher Design Principles - Answer (click here)
63. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
64. Divisibility and the Division Algorithm - Answer (click here)
65. The Euclidean Algorithm - Answer (click here)
66. Modular Arithmetic - Answer (click here)
67. Groups, Rings, and Fields - Answer (click here)
68. Finite Fields Of The Form GF(p) - Answer (click here)
69. Polynomial Arithmetic - Answer (click here)
70. Finite Fields of the Form GF(2n) - Answer (click here)
71. Advanced Encryption Standard(AES) - Answer (click here)
72. Finite Field Arithmetic - Answer (click here)
73. AES(Advanced Encryption Standard) Structure - Answer (click here)
74. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
75. AES Key Expansion - Answer (click here)
76. An Advanced Encryption Standard(AES) Example - Answer (click here)
77. AES(Advanced Encryption Standard) Implementation - Answer (click here)
78. Block Cipher Operation - Answer (click here)
79. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
80. Electronic Code Book - Answer (click here)
81. Cipher Block Chaining(CBC) Mode - Answer (click here)
82. Cipher Feedback Mode - Answer (click here)
83. Output Feedback Mode - Answer (click here)
84. Counter Mode - Answer (click here)
85. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
86. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
87. Principles of Pseudorandom Number Generation - Answer (click here)
88. Pseudorandom Number Generators - Answer (click here)
89. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
90. Stream Ciphers - Answer (click here)
91. RC4 - Answer (click here)
92. True Random Number Generators - Answer (click here)
93. Introduction to Number Theory - Answer (click here)
94. Prime Numbers - Answer (click here)
95. Fermat’s And Euler’s Theorems - Answer (click here)
96. Testing for Primality - Answer (click here)
97. The Chinese Remainder Theorem - Answer (click here)
98. Discrete Logarithms - Answer (click here)
99. Public-Key Cryptography and RSA - Answer (click here)
100. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
101. The RSA Algorithm - Answer (click here)
102. Description of the RSA Algorithm - Answer (click here)
103. The Security of RSA - Answer (click here)
104. Other Public-Key Cryptosystems - Answer (click here)
105. Diffie-Hellman Key Exchange - Answer (click here)
106. Elgamal Cryptographic System - Answer (click here)
107. Elliptic Curve Arithmetic - Answer (click here)
108. Elliptic Curve Cryptography - Answer (click here)
109. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
110. Cryptographic Hash Functions - Answer (click here)
111. Applications of Cryptographic Hash Functions - Answer (click here)
112. Two Simple Hash Functions - Answer (click here)
113. Requirements and Security - Answer (click here)
114. Hash Functions Based on Cipher Block Chaining - Answer (click here)
115. Secure Hash Algorithm (SHA) - Answer (click here)
116. SHA-3 - Answer (click here)
117. Message Authentication Codes - Answer (click here)
118. Message Authentication Requirements - Answer (click here)
119. Message Authentication Functions - Answer (click here)
120. Requirements For Message Authentication Codes - Answer (click here)
121. Security of MACS - Answer (click here)
122. MACS Based on Hash Functions: HMAC - Answer (click here)
123. MACS Based on Block Ciphers: DAA And CMAC - Answer (click here)
124. Authenticated Encryption: CCM and GCM - Answer (click here)
125. Pseudorandom Number Generation Using Hash Functions and MACS -
Answer (click here)
126. Digital Signatures - Answer (click here)
127. Digital Signatures: Properties, Attacks and Forgeries - Answer (click here)
128. ELGAMAL Digital Signature Scheme - Answer (click here)
129. Schnorr Digital Signature Scheme - Answer (click here)
130. Digital Signature Standard - Answer (click here)
131. Key Management and Distribution - Answer (click here)
132. Symmetric Key Distribution Using Symmetric Encryption - Answer (click
here)
133. Symmetric Key Distribution Using Asymmetric Encryption - Answer
(click here)
134. Distribution of Public Keys - Answer (click here)
135. X.509 Certificates - Answer (click here)
136. Public-Key Infrastructure - Answer (click here)
137. User Authentication - Answer (click here)
138. Remote User-Authentication Principles - Answer (click here)
139. Remote User-Authentication Using Symmetric Encryption - Answer (click
here)
140. Kerberos - Answer (click here)
141. Remote User Authentication Using Asymmetric Encryption - Answer
(click here)
142. Federated Identity Management - Answer (click here)
143. Transport-Level Security - Answer (click here)
144. Web Security Considerations - Answer (click here)
145. Secure Socket Layer and Transport Layer Security - Answer (click here)
146. Transport Layer Security - Answer (click here)
147. HTTPS - Answer (click here)
148. Secure Shell (SSH) - Answer (click here)
149. Wireless Network Security - Answer (click here)
150. IEEE 802.11 Wireless LAN Overview: Wi-Fi Alliance, Protocol
Architecture, Network Components - Answer (click here)
151. IEEE 802.11i Wireless LAN Security - Answer (click here)
152. Wireless Application Protocol Overview - Answer (click here)
153. Wireless Transport Layer Security - Answer (click here)
154. WAP End-to-End Security - Answer (click here)
155. Electronic Mail Security - Answer (click here)
156. Pretty Good Privacy - Answer (click here)
157. S/MIME - Answer (click here)
158. DomainKeys Identified Mail - Answer (click here)
159. IP Security(IPsec) - Answer (click here)
160. IP Security Overview - Answer (click here)
161. IP Security Policy - Answer (click here)
162. Encapsulating Security Payload - Answer (click here)
163. Combining Security Associations - Answer (click here)
164. Internet Key Exchange - Answer (click here)
165. Cryptographic Suites - Answer (click here)

PART SIX SYSTEM SECURITY


Chapter 20 Intruders
1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)
8. Simplified Data Encryption Standard (S-DES) - Answer (click here)
9. Block Cipher Principles - Answer (click here)
10. Multiple Encryption & DES - Answer (click here)
11. Modes of Operation - Answer (click here)
12. Stream Ciphers - Answer (click here)
13. RC4 - Answer (click here)
14. Principles of Public Key Cryptography - Answer (click here)
15. RSA Algorithm - Answer (click here)
16. Diffie-Hellman Key Exchange - Answer (click here)
17. Elliptic Curve Cryptography - Answer (click here)
18. Hash Functions - Answer (click here)
19. Simple Hash Functions - Answer (click here)
20. Birthday Attacks - Answer (click here)
21. Security of Hash Functions and Macs - Answer (click here)
22. Secure Hash Algorithm - Answer (click here)
23. Digital Signatures - Answer (click here)
24. Direct Digital Signatures - Answer (click here)
25. Digital Signature Algorithm(DSA) - Answer (click here)
26. Authentication Applications - Answer (click here)
27. Kerbero V4 Authentication Dialogue Message Exchange - Answer (click
here)
28. X.509 Certificates - Answer (click here)
29. Authentication Procedures - Answer (click here)
30. Electronic Mail Security - Answer (click here)
31. Public-Key Management - Answer (click here)
32. S/MIME - Answer (click here)
33. S/MIME Functionality and Messages - Answer (click here)
34. Intruders - Answer (click here)
35. Intrusion Detection - Answer (click here)
36. Password Management - Answer (click here)
37. Firewalls: design principles, characteristics, Limitations, Types - Answer
(click here)
38. Firewall configurations - Answer (click here)
39. Trusted systems - Answer (click here)
40. Viruses And Related Threats - Answer (click here)
41. Types of Network Viruses - Answer (click here)
42. Network Virus Countermeasures - Answer (click here)
43. Concepts and Definition of Computer Security - Answer (click here)
44. The Challenges of Computer Security - Answer (click here)
45. The OSI Security Architecture - Answer (click here)
46. Security Attacks: Passive and Active Attacks - Answer (click here)
47. Security Services - Answer (click here)
48. Security Mechanisms - Answer (click here)
49. A Model For Network Security - Answer (click here)
50. Classical Encryption Techniques - Answer (click here)
51. Symmetric Cipher Model - Answer (click here)
52. Substitution Techniques - Answer (click here)
53. Transposition Techniques - Answer (click here)
54. Rotor Machines - Answer (click here)
55. Steganography - Answer (click here)
56. Block Ciphers and the Data Encryption Standard - Answer (click here)
57. Block Cipher Principles - Answer (click here)
58. The Data Encryption Standard - Answer (click here)
59. A DES(Data Encryption Standard) Example - Answer (click here)
60. The Strength of DES(Data Encryption Standard) - Answer (click here)
61. Differential and Linear Cryptanalysis - Answer (click here)
62. Block Cipher Design Principles - Answer (click here)
63. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
64. Divisibility and the Division Algorithm - Answer (click here)
65. The Euclidean Algorithm - Answer (click here)
66. Modular Arithmetic - Answer (click here)
67. Groups, Rings, and Fields - Answer (click here)
68. Finite Fields Of The Form GF(p) - Answer (click here)
69. Polynomial Arithmetic - Answer (click here)
70. Finite Fields of the Form GF(2n) - Answer (click here)
71. Advanced Encryption Standard(AES) - Answer (click here)
72. Finite Field Arithmetic - Answer (click here)
73. AES(Advanced Encryption Standard) Structure - Answer (click here)
74. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
75. AES Key Expansion - Answer (click here)
76. An Advanced Encryption Standard(AES) Example - Answer (click here)
77. AES(Advanced Encryption Standard) Implementation - Answer (click here)
78. Block Cipher Operation - Answer (click here)
79. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
80. Electronic Code Book - Answer (click here)
81. Cipher Block Chaining(CBC) Mode - Answer (click here)
82. Cipher Feedback Mode - Answer (click here)
83. Output Feedback Mode - Answer (click here)
84. Counter Mode - Answer (click here)
85. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
86. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
87. Principles of Pseudorandom Number Generation - Answer (click here)
88. Pseudorandom Number Generators - Answer (click here)
89. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
90. Stream Ciphers - Answer (click here)
91. RC4 - Answer (click here)
92. True Random Number Generators - Answer (click here)
93. Introduction to Number Theory - Answer (click here)
94. Prime Numbers - Answer (click here)
95. Fermat’s And Euler’s Theorems - Answer (click here)
96. Testing for Primality - Answer (click here)
97. The Chinese Remainder Theorem - Answer (click here)
98. Discrete Logarithms - Answer (click here)
99. Public-Key Cryptography and RSA - Answer (click here)
100. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
101. The RSA Algorithm - Answer (click here)
102. Description of the RSA Algorithm - Answer (click here)
103. The Security of RSA - Answer (click here)
104. Other Public-Key Cryptosystems - Answer (click here)
105. Diffie-Hellman Key Exchange - Answer (click here)
106. Elgamal Cryptographic System - Answer (click here)
107. Elliptic Curve Arithmetic - Answer (click here)
108. Elliptic Curve Cryptography - Answer (click here)
109. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
110. Cryptographic Hash Functions - Answer (click here)
111. Applications of Cryptographic Hash Functions - Answer (click here)
112. Two Simple Hash Functions - Answer (click here)
113. Requirements and Security - Answer (click here)
114. Hash Functions Based on Cipher Block Chaining - Answer (click here)
115. Secure Hash Algorithm (SHA) - Answer (click here)
116. SHA-3 - Answer (click here)
117. Message Authentication Codes - Answer (click here)
118. Message Authentication Requirements - Answer (click here)
119. Message Authentication Functions - Answer (click here)
120. Requirements For Message Authentication Codes - Answer (click here)
121. Security of MACS - Answer (click here)
122. MACS Based on Hash Functions: HMAC - Answer (click here)
123. MACS Based on Block Ciphers: DAA And CMAC - Answer (click here)
124. Authenticated Encryption: CCM and GCM - Answer (click here)
125. Pseudorandom Number Generation Using Hash Functions and MACS -
Answer (click here)
126. Digital Signatures - Answer (click here)
127. Digital Signatures: Properties, Attacks and Forgeries - Answer (click here)
128. ELGAMAL Digital Signature Scheme - Answer (click here)
129. Schnorr Digital Signature Scheme - Answer (click here)
130. Digital Signature Standard - Answer (click here)
131. Key Management and Distribution - Answer (click here)
132. Symmetric Key Distribution Using Symmetric Encryption - Answer (click
here)
133. Symmetric Key Distribution Using Asymmetric Encryption - Answer
(click here)
134. Distribution of Public Keys - Answer (click here)
135. X.509 Certificates - Answer (click here)
136. Public-Key Infrastructure - Answer (click here)
137. User Authentication - Answer (click here)
138. Remote User-Authentication Principles - Answer (click here)
139. Remote User-Authentication Using Symmetric Encryption - Answer (click
here)
140. Kerberos - Answer (click here)
141. Remote User Authentication Using Asymmetric Encryption - Answer
(click here)
142. Federated Identity Management - Answer (click here)
143. Transport-Level Security - Answer (click here)
144. Web Security Considerations - Answer (click here)
145. Secure Socket Layer and Transport Layer Security - Answer (click here)
146. Transport Layer Security - Answer (click here)
147. HTTPS - Answer (click here)
148. Secure Shell (SSH) - Answer (click here)
149. Wireless Network Security - Answer (click here)
150. IEEE 802.11 Wireless LAN Overview: Wi-Fi Alliance, Protocol
Architecture, Network Components - Answer (click here)
151. IEEE 802.11i Wireless LAN Security - Answer (click here)
152. Wireless Application Protocol Overview - Answer (click here)
153. Wireless Transport Layer Security - Answer (click here)
154. WAP End-to-End Security - Answer (click here)
155. Electronic Mail Security - Answer (click here)
156. Pretty Good Privacy - Answer (click here)
157. S/MIME - Answer (click here)
158. DomainKeys Identified Mail - Answer (click here)
159. IP Security(IPsec) - Answer (click here)
160. IP Security Overview - Answer (click here)
161. IP Security Policy - Answer (click here)
162. Encapsulating Security Payload - Answer (click here)
163. Combining Security Associations - Answer (click here)
164. Internet Key Exchange - Answer (click here)
165. Cryptographic Suites - Answer (click here)
166. Intruders - Answer (click here)
167. Intruders: Behavior Patterns and Techniques - Answer (click here)
168. Intrusion Detection - Answer (click here)
169. Password Management - Answer (click here)

Chapter 21 Malicious Software


1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)
8. Simplified Data Encryption Standard (S-DES) - Answer (click here)
9. Block Cipher Principles - Answer (click here)
10. Multiple Encryption & DES - Answer (click here)
11. Modes of Operation - Answer (click here)
12. Stream Ciphers - Answer (click here)
13. RC4 - Answer (click here)
14. Principles of Public Key Cryptography - Answer (click here)
15. RSA Algorithm - Answer (click here)
16. Diffie-Hellman Key Exchange - Answer (click here)
17. Elliptic Curve Cryptography - Answer (click here)
18. Hash Functions - Answer (click here)
19. Simple Hash Functions - Answer (click here)
20. Birthday Attacks - Answer (click here)
21. Security of Hash Functions and Macs - Answer (click here)
22. Secure Hash Algorithm - Answer (click here)
23. Digital Signatures - Answer (click here)
24. Direct Digital Signatures - Answer (click here)
25. Digital Signature Algorithm(DSA) - Answer (click here)
26. Authentication Applications - Answer (click here)
27. Kerbero V4 Authentication Dialogue Message Exchange - Answer (click
here)
28. X.509 Certificates - Answer (click here)
29. Authentication Procedures - Answer (click here)
30. Electronic Mail Security - Answer (click here)
31. Public-Key Management - Answer (click here)
32. S/MIME - Answer (click here)
33. S/MIME Functionality and Messages - Answer (click here)
34. Intruders - Answer (click here)
35. Intrusion Detection - Answer (click here)
36. Password Management - Answer (click here)
37. Firewalls: design principles, characteristics, Limitations, Types - Answer
(click here)
38. Firewall configurations - Answer (click here)
39. Trusted systems - Answer (click here)
40. Viruses And Related Threats - Answer (click here)
41. Types of Network Viruses - Answer (click here)
42. Network Virus Countermeasures - Answer (click here)
43. Concepts and Definition of Computer Security - Answer (click here)
44. The Challenges of Computer Security - Answer (click here)
45. The OSI Security Architecture - Answer (click here)
46. Security Attacks: Passive and Active Attacks - Answer (click here)
47. Security Services - Answer (click here)
48. Security Mechanisms - Answer (click here)
49. A Model For Network Security - Answer (click here)
50. Classical Encryption Techniques - Answer (click here)
51. Symmetric Cipher Model - Answer (click here)
52. Substitution Techniques - Answer (click here)
53. Transposition Techniques - Answer (click here)
54. Rotor Machines - Answer (click here)
55. Steganography - Answer (click here)
56. Block Ciphers and the Data Encryption Standard - Answer (click here)
57. Block Cipher Principles - Answer (click here)
58. The Data Encryption Standard - Answer (click here)
59. A DES(Data Encryption Standard) Example - Answer (click here)
60. The Strength of DES(Data Encryption Standard) - Answer (click here)
61. Differential and Linear Cryptanalysis - Answer (click here)
62. Block Cipher Design Principles - Answer (click here)
63. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
64. Divisibility and the Division Algorithm - Answer (click here)
65. The Euclidean Algorithm - Answer (click here)
66. Modular Arithmetic - Answer (click here)
67. Groups, Rings, and Fields - Answer (click here)
68. Finite Fields Of The Form GF(p) - Answer (click here)
69. Polynomial Arithmetic - Answer (click here)
70. Finite Fields of the Form GF(2n) - Answer (click here)
71. Advanced Encryption Standard(AES) - Answer (click here)
72. Finite Field Arithmetic - Answer (click here)
73. AES(Advanced Encryption Standard) Structure - Answer (click here)
74. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
75. AES Key Expansion - Answer (click here)
76. An Advanced Encryption Standard(AES) Example - Answer (click here)
77. AES(Advanced Encryption Standard) Implementation - Answer (click here)
78. Block Cipher Operation - Answer (click here)
79. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
80. Electronic Code Book - Answer (click here)
81. Cipher Block Chaining(CBC) Mode - Answer (click here)
82. Cipher Feedback Mode - Answer (click here)
83. Output Feedback Mode - Answer (click here)
84. Counter Mode - Answer (click here)
85. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
86. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
87. Principles of Pseudorandom Number Generation - Answer (click here)
88. Pseudorandom Number Generators - Answer (click here)
89. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
90. Stream Ciphers - Answer (click here)
91. RC4 - Answer (click here)
92. True Random Number Generators - Answer (click here)
93. Introduction to Number Theory - Answer (click here)
94. Prime Numbers - Answer (click here)
95. Fermat’s And Euler’s Theorems - Answer (click here)
96. Testing for Primality - Answer (click here)
97. The Chinese Remainder Theorem - Answer (click here)
98. Discrete Logarithms - Answer (click here)
99. Public-Key Cryptography and RSA - Answer (click here)
100. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
101. The RSA Algorithm - Answer (click here)
102. Description of the RSA Algorithm - Answer (click here)
103. The Security of RSA - Answer (click here)
104. Other Public-Key Cryptosystems - Answer (click here)
105. Diffie-Hellman Key Exchange - Answer (click here)
106. Elgamal Cryptographic System - Answer (click here)
107. Elliptic Curve Arithmetic - Answer (click here)
108. Elliptic Curve Cryptography - Answer (click here)
109. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
110. Cryptographic Hash Functions - Answer (click here)
111. Applications of Cryptographic Hash Functions - Answer (click here)
112. Two Simple Hash Functions - Answer (click here)
113. Requirements and Security - Answer (click here)
114. Hash Functions Based on Cipher Block Chaining - Answer (click here)
115. Secure Hash Algorithm (SHA) - Answer (click here)
116. SHA-3 - Answer (click here)
117. Message Authentication Codes - Answer (click here)
118. Message Authentication Requirements - Answer (click here)
119. Message Authentication Functions - Answer (click here)
120. Requirements For Message Authentication Codes - Answer (click here)
121. Security of MACS - Answer (click here)
122. MACS Based on Hash Functions: HMAC - Answer (click here)
123. MACS Based on Block Ciphers: DAA And CMAC - Answer (click here)
124. Authenticated Encryption: CCM and GCM - Answer (click here)
125. Pseudorandom Number Generation Using Hash Functions and MACS -
Answer (click here)
126. Digital Signatures - Answer (click here)
127. Digital Signatures: Properties, Attacks and Forgeries - Answer (click here)
128. ELGAMAL Digital Signature Scheme - Answer (click here)
129. Schnorr Digital Signature Scheme - Answer (click here)
130. Digital Signature Standard - Answer (click here)
131. Key Management and Distribution - Answer (click here)
132. Symmetric Key Distribution Using Symmetric Encryption - Answer (click
here)
133. Symmetric Key Distribution Using Asymmetric Encryption - Answer
(click here)
134. Distribution of Public Keys - Answer (click here)
135. X.509 Certificates - Answer (click here)
136. Public-Key Infrastructure - Answer (click here)
137. User Authentication - Answer (click here)
138. Remote User-Authentication Principles - Answer (click here)
139. Remote User-Authentication Using Symmetric Encryption - Answer (click
here)
140. Kerberos - Answer (click here)
141. Remote User Authentication Using Asymmetric Encryption - Answer
(click here)
142. Federated Identity Management - Answer (click here)
143. Transport-Level Security - Answer (click here)
144. Web Security Considerations - Answer (click here)
145. Secure Socket Layer and Transport Layer Security - Answer (click here)
146. Transport Layer Security - Answer (click here)
147. HTTPS - Answer (click here)
148. Secure Shell (SSH) - Answer (click here)
149. Wireless Network Security - Answer (click here)
150. IEEE 802.11 Wireless LAN Overview: Wi-Fi Alliance, Protocol
Architecture, Network Components - Answer (click here)
151. IEEE 802.11i Wireless LAN Security - Answer (click here)
152. Wireless Application Protocol Overview - Answer (click here)
153. Wireless Transport Layer Security - Answer (click here)
154. WAP End-to-End Security - Answer (click here)
155. Electronic Mail Security - Answer (click here)
156. Pretty Good Privacy - Answer (click here)
157. S/MIME - Answer (click here)
158. DomainKeys Identified Mail - Answer (click here)
159. IP Security(IPsec) - Answer (click here)
160. IP Security Overview - Answer (click here)
161. IP Security Policy - Answer (click here)
162. Encapsulating Security Payload - Answer (click here)
163. Combining Security Associations - Answer (click here)
164. Internet Key Exchange - Answer (click here)
165. Cryptographic Suites - Answer (click here)
166. Intruders - Answer (click here)
167. Intruders: Behavior Patterns and Techniques - Answer (click here)
168. Intrusion Detection - Answer (click here)
169. Password Management - Answer (click here)
170. Malicious Software - Answer (click here)
171. Types of Malicious Software - Answer (click here)
172. Computer Viruses: Nature, Classification, Virus Kits - Answer (click here)
173. Computer Virus Countermeasures - Answer (click here)
174. Computer or Network Worms - Answer (click here)
175. Distributed Denial of Service Attacks - Answer (click here)
176. Firewalls - Answer (click here)

Chapter 22 Firewalls
1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)
8. Simplified Data Encryption Standard (S-DES) - Answer (click here)
9. Block Cipher Principles - Answer (click here)
10. Multiple Encryption & DES - Answer (click here)
11. Modes of Operation - Answer (click here)
12. Stream Ciphers - Answer (click here)
13. RC4 - Answer (click here)
14. Principles of Public Key Cryptography - Answer (click here)
15. RSA Algorithm - Answer (click here)
16. Diffie-Hellman Key Exchange - Answer (click here)
17. Elliptic Curve Cryptography - Answer (click here)
18. Hash Functions - Answer (click here)
19. Simple Hash Functions - Answer (click here)
20. Birthday Attacks - Answer (click here)
21. Security of Hash Functions and Macs - Answer (click here)
22. Secure Hash Algorithm - Answer (click here)
23. Digital Signatures - Answer (click here)
24. Direct Digital Signatures - Answer (click here)
25. Digital Signature Algorithm(DSA) - Answer (click here)
26. Authentication Applications - Answer (click here)
27. Kerbero V4 Authentication Dialogue Message Exchange - Answer (click
here)
28. X.509 Certificates - Answer (click here)
29. Authentication Procedures - Answer (click here)
30. Electronic Mail Security - Answer (click here)
31. Public-Key Management - Answer (click here)
32. S/MIME - Answer (click here)
33. S/MIME Functionality and Messages - Answer (click here)
34. Intruders - Answer (click here)
35. Intrusion Detection - Answer (click here)
36. Password Management - Answer (click here)
37. Firewalls: design principles, characteristics, Limitations, Types - Answer
(click here)
38. Firewall configurations - Answer (click here)
39. Trusted systems - Answer (click here)
40. Viruses And Related Threats - Answer (click here)
41. Types of Network Viruses - Answer (click here)
42. Network Virus Countermeasures - Answer (click here)
43. Concepts and Definition of Computer Security - Answer (click here)
44. The Challenges of Computer Security - Answer (click here)
45. The OSI Security Architecture - Answer (click here)
46. Security Attacks: Passive and Active Attacks - Answer (click here)
47. Security Services - Answer (click here)
48. Security Mechanisms - Answer (click here)
49. A Model For Network Security - Answer (click here)
50. Classical Encryption Techniques - Answer (click here)
51. Symmetric Cipher Model - Answer (click here)
52. Substitution Techniques - Answer (click here)
53. Transposition Techniques - Answer (click here)
54. Rotor Machines - Answer (click here)
55. Steganography - Answer (click here)
56. Block Ciphers and the Data Encryption Standard - Answer (click here)
57. Block Cipher Principles - Answer (click here)
58. The Data Encryption Standard - Answer (click here)
59. A DES(Data Encryption Standard) Example - Answer (click here)
60. The Strength of DES(Data Encryption Standard) - Answer (click here)
61. Differential and Linear Cryptanalysis - Answer (click here)
62. Block Cipher Design Principles - Answer (click here)
63. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
64. Divisibility and the Division Algorithm - Answer (click here)
65. The Euclidean Algorithm - Answer (click here)
66. Modular Arithmetic - Answer (click here)
67. Groups, Rings, and Fields - Answer (click here)
68. Finite Fields Of The Form GF(p) - Answer (click here)
69. Polynomial Arithmetic - Answer (click here)
70. Finite Fields of the Form GF(2n) - Answer (click here)
71. Advanced Encryption Standard(AES) - Answer (click here)
72. Finite Field Arithmetic - Answer (click here)
73. AES(Advanced Encryption Standard) Structure - Answer (click here)
74. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
75. AES Key Expansion - Answer (click here)
76. An Advanced Encryption Standard(AES) Example - Answer (click here)
77. AES(Advanced Encryption Standard) Implementation - Answer (click here)
78. Block Cipher Operation - Answer (click here)
79. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
80. Electronic Code Book - Answer (click here)
81. Cipher Block Chaining(CBC) Mode - Answer (click here)
82. Cipher Feedback Mode - Answer (click here)
83. Output Feedback Mode - Answer (click here)
84. Counter Mode - Answer (click here)
85. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
86. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
87. Principles of Pseudorandom Number Generation - Answer (click here)
88. Pseudorandom Number Generators - Answer (click here)
89. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
90. Stream Ciphers - Answer (click here)
91. RC4 - Answer (click here)
92. True Random Number Generators - Answer (click here)
93. Introduction to Number Theory - Answer (click here)
94. Prime Numbers - Answer (click here)
95. Fermat’s And Euler’s Theorems - Answer (click here)
96. Testing for Primality - Answer (click here)
97. The Chinese Remainder Theorem - Answer (click here)
98. Discrete Logarithms - Answer (click here)
99. Public-Key Cryptography and RSA - Answer (click here)
100. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
101. The RSA Algorithm - Answer (click here)
102. Description of the RSA Algorithm - Answer (click here)
103. The Security of RSA - Answer (click here)
104. Other Public-Key Cryptosystems - Answer (click here)
105. Diffie-Hellman Key Exchange - Answer (click here)
106. Elgamal Cryptographic System - Answer (click here)
107. Elliptic Curve Arithmetic - Answer (click here)
108. Elliptic Curve Cryptography - Answer (click here)
109. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
110. Cryptographic Hash Functions - Answer (click here)
111. Applications of Cryptographic Hash Functions - Answer (click here)
112. Two Simple Hash Functions - Answer (click here)
113. Requirements and Security - Answer (click here)
114. Hash Functions Based on Cipher Block Chaining - Answer (click here)
115. Secure Hash Algorithm (SHA) - Answer (click here)
116. SHA-3 - Answer (click here)
117. Message Authentication Codes - Answer (click here)
118. Message Authentication Requirements - Answer (click here)
119. Message Authentication Functions - Answer (click here)
120. Requirements For Message Authentication Codes - Answer (click here)
121. Security of MACS - Answer (click here)
122. MACS Based on Hash Functions: HMAC - Answer (click here)
123. MACS Based on Block Ciphers: DAA And CMAC - Answer (click here)
124. Authenticated Encryption: CCM and GCM - Answer (click here)
125. Pseudorandom Number Generation Using Hash Functions and MACS -
Answer (click here)
126. Digital Signatures - Answer (click here)
127. Digital Signatures: Properties, Attacks and Forgeries - Answer (click here)
128. ELGAMAL Digital Signature Scheme - Answer (click here)
129. Schnorr Digital Signature Scheme - Answer (click here)
130. Digital Signature Standard - Answer (click here)
131. Key Management and Distribution - Answer (click here)
132. Symmetric Key Distribution Using Symmetric Encryption - Answer (click
here)
133. Symmetric Key Distribution Using Asymmetric Encryption - Answer
(click here)
134. Distribution of Public Keys - Answer (click here)
135. X.509 Certificates - Answer (click here)
136. Public-Key Infrastructure - Answer (click here)
137. User Authentication - Answer (click here)
138. Remote User-Authentication Principles - Answer (click here)
139. Remote User-Authentication Using Symmetric Encryption - Answer (click
here)
140. Kerberos - Answer (click here)
141. Remote User Authentication Using Asymmetric Encryption - Answer
(click here)
142. Federated Identity Management - Answer (click here)
143. Transport-Level Security - Answer (click here)
144. Web Security Considerations - Answer (click here)
145. Secure Socket Layer and Transport Layer Security - Answer (click here)
146. Transport Layer Security - Answer (click here)
147. HTTPS - Answer (click here)
148. Secure Shell (SSH) - Answer (click here)
149. Wireless Network Security - Answer (click here)
150. IEEE 802.11 Wireless LAN Overview: Wi-Fi Alliance, Protocol
Architecture, Network Components - Answer (click here)
151. IEEE 802.11i Wireless LAN Security - Answer (click here)
152. Wireless Application Protocol Overview - Answer (click here)
153. Wireless Transport Layer Security - Answer (click here)
154. WAP End-to-End Security - Answer (click here)
155. Electronic Mail Security - Answer (click here)
156. Pretty Good Privacy - Answer (click here)
157. S/MIME - Answer (click here)
158. DomainKeys Identified Mail - Answer (click here)
159. IP Security(IPsec) - Answer (click here)
160. IP Security Overview - Answer (click here)
161. IP Security Policy - Answer (click here)
162. Encapsulating Security Payload - Answer (click here)
163. Combining Security Associations - Answer (click here)
164. Internet Key Exchange - Answer (click here)
165. Cryptographic Suites - Answer (click here)
166. Intruders - Answer (click here)
167. Intruders: Behavior Patterns and Techniques - Answer (click here)
168. Intrusion Detection - Answer (click here)
169. Password Management - Answer (click here)
170. Malicious Software - Answer (click here)
171. Types of Malicious Software - Answer (click here)
172. Computer Viruses: Nature, Classification, Virus Kits - Answer (click here)
173. Computer Virus Countermeasures - Answer (click here)
174. Computer or Network Worms - Answer (click here)
175. Distributed Denial of Service Attacks - Answer (click here)
176. Firewalls - Answer (click here)
177. The Need for Firewalls - Answer (click here)
178. Firewall Characteristics and limitations - Answer (click here)
179. Types of Firewalls - Answer (click here)
180. Firewall Basing - Answer (click here)
181. Firewall Location and Configurations - Answer (click here)

PART SEVEN LEGAL AND ETHICAL ISSUES


Chapter 23 Legal and Ethical Issues
1. Cryptography and Network Security - Introduction - Answer (click here)
2. The OSI Security Architecture - Answer (click here)
3. Classical CryptoSystems - Answer (click here)
4. Classical Encryption Techniques - Answer (click here)
5. Linear Feedback Shift Register (LFSR) - Answer (click here)
6. Introduction to Number Theory - Answer (click here)
7. Finite Fields - Answer (click here)
8. Simplified Data Encryption Standard (S-DES) - Answer (click here)
9. Block Cipher Principles - Answer (click here)
10. Multiple Encryption & DES - Answer (click here)
11. Modes of Operation - Answer (click here)
12. Stream Ciphers - Answer (click here)
13. RC4 - Answer (click here)
14. Principles of Public Key Cryptography - Answer (click here)
15. RSA Algorithm - Answer (click here)
16. Diffie-Hellman Key Exchange - Answer (click here)
17. Elliptic Curve Cryptography - Answer (click here)
18. Hash Functions - Answer (click here)
19. Simple Hash Functions - Answer (click here)
20. Birthday Attacks - Answer (click here)
21. Security of Hash Functions and Macs - Answer (click here)
22. Secure Hash Algorithm - Answer (click here)
23. Digital Signatures - Answer (click here)
24. Direct Digital Signatures - Answer (click here)
25. Digital Signature Algorithm(DSA) - Answer (click here)
26. Authentication Applications - Answer (click here)
27. Kerbero V4 Authentication Dialogue Message Exchange - Answer (click
here)
28. X.509 Certificates - Answer (click here)
29. Authentication Procedures - Answer (click here)
30. Electronic Mail Security - Answer (click here)
31. Public-Key Management - Answer (click here)
32. S/MIME - Answer (click here)
33. S/MIME Functionality and Messages - Answer (click here)
34. Intruders - Answer (click here)
35. Intrusion Detection - Answer (click here)
36. Password Management - Answer (click here)
37. Firewalls: design principles, characteristics, Limitations, Types - Answer
(click here)
38. Firewall configurations - Answer (click here)
39. Trusted systems - Answer (click here)
40. Viruses And Related Threats - Answer (click here)
41. Types of Network Viruses - Answer (click here)
42. Network Virus Countermeasures - Answer (click here)
43. Concepts and Definition of Computer Security - Answer (click here)
44. The Challenges of Computer Security - Answer (click here)
45. The OSI Security Architecture - Answer (click here)
46. Security Attacks: Passive and Active Attacks - Answer (click here)
47. Security Services - Answer (click here)
48. Security Mechanisms - Answer (click here)
49. A Model For Network Security - Answer (click here)
50. Classical Encryption Techniques - Answer (click here)
51. Symmetric Cipher Model - Answer (click here)
52. Substitution Techniques - Answer (click here)
53. Transposition Techniques - Answer (click here)
54. Rotor Machines - Answer (click here)
55. Steganography - Answer (click here)
56. Block Ciphers and the Data Encryption Standard - Answer (click here)
57. Block Cipher Principles - Answer (click here)
58. The Data Encryption Standard - Answer (click here)
59. A DES(Data Encryption Standard) Example - Answer (click here)
60. The Strength of DES(Data Encryption Standard) - Answer (click here)
61. Differential and Linear Cryptanalysis - Answer (click here)
62. Block Cipher Design Principles - Answer (click here)
63. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
64. Divisibility and the Division Algorithm - Answer (click here)
65. The Euclidean Algorithm - Answer (click here)
66. Modular Arithmetic - Answer (click here)
67. Groups, Rings, and Fields - Answer (click here)
68. Finite Fields Of The Form GF(p) - Answer (click here)
69. Polynomial Arithmetic - Answer (click here)
70. Finite Fields of the Form GF(2n) - Answer (click here)
71. Advanced Encryption Standard(AES) - Answer (click here)
72. Finite Field Arithmetic - Answer (click here)
73. AES(Advanced Encryption Standard) Structure - Answer (click here)
74. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
75. AES Key Expansion - Answer (click here)
76. An Advanced Encryption Standard(AES) Example - Answer (click here)
77. AES(Advanced Encryption Standard) Implementation - Answer (click here)
78. Block Cipher Operation - Answer (click here)
79. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
80. Electronic Code Book - Answer (click here)
81. Cipher Block Chaining(CBC) Mode - Answer (click here)
82. Cipher Feedback Mode - Answer (click here)
83. Output Feedback Mode - Answer (click here)
84. Counter Mode - Answer (click here)
85. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)
86. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
87. Principles of Pseudorandom Number Generation - Answer (click here)
88. Pseudorandom Number Generators - Answer (click here)
89. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
90. Stream Ciphers - Answer (click here)
91. RC4 - Answer (click here)
92. True Random Number Generators - Answer (click here)
93. Introduction to Number Theory - Answer (click here)
94. Prime Numbers - Answer (click here)
95. Fermat’s And Euler’s Theorems - Answer (click here)
96. Testing for Primality - Answer (click here)
97. The Chinese Remainder Theorem - Answer (click here)
98. Discrete Logarithms - Answer (click here)
99. Public-Key Cryptography and RSA - Answer (click here)
100. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
101. The RSA Algorithm - Answer (click here)
102. Description of the RSA Algorithm - Answer (click here)
103. The Security of RSA - Answer (click here)
104. Other Public-Key Cryptosystems - Answer (click here)
105. Diffie-Hellman Key Exchange - Answer (click here)
106. Elgamal Cryptographic System - Answer (click here)
107. Elliptic Curve Arithmetic - Answer (click here)
108. Elliptic Curve Cryptography - Answer (click here)
109. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)
110. Cryptographic Hash Functions - Answer (click here)
111. Applications of Cryptographic Hash Functions - Answer (click here)
112. Two Simple Hash Functions - Answer (click here)
113. Requirements and Security - Answer (click here)
114. Hash Functions Based on Cipher Block Chaining - Answer (click here)
115. Secure Hash Algorithm (SHA) - Answer (click here)
116. SHA-3 - Answer (click here)
117. Message Authentication Codes - Answer (click here)
118. Message Authentication Requirements - Answer (click here)
119. Message Authentication Functions - Answer (click here)
120. Requirements For Message Authentication Codes - Answer (click here)
121. Security of MACS - Answer (click here)
122. MACS Based on Hash Functions: HMAC - Answer (click here)
123. MACS Based on Block Ciphers: DAA And CMAC - Answer (click here)
124. Authenticated Encryption: CCM and GCM - Answer (click here)
125. Pseudorandom Number Generation Using Hash Functions and MACS -
Answer (click here)
126. Digital Signatures - Answer (click here)
127. Digital Signatures: Properties, Attacks and Forgeries - Answer (click here)
128. ELGAMAL Digital Signature Scheme - Answer (click here)
129. Schnorr Digital Signature Scheme - Answer (click here)
130. Digital Signature Standard - Answer (click here)
131. Key Management and Distribution - Answer (click here)
132. Symmetric Key Distribution Using Symmetric Encryption - Answer (click
here)
133. Symmetric Key Distribution Using Asymmetric Encryption - Answer
(click here)
134. Distribution of Public Keys - Answer (click here)
135. X.509 Certificates - Answer (click here)
136. Public-Key Infrastructure - Answer (click here)
137. User Authentication - Answer (click here)
138. Remote User-Authentication Principles - Answer (click here)
139. Remote User-Authentication Using Symmetric Encryption - Answer (click
here)
140. Kerberos - Answer (click here)
141. Remote User Authentication Using Asymmetric Encryption - Answer
(click here)
142. Federated Identity Management - Answer (click here)
143. Transport-Level Security - Answer (click here)
144. Web Security Considerations - Answer (click here)
145. Secure Socket Layer and Transport Layer Security - Answer (click here)
146. Transport Layer Security - Answer (click here)
147. HTTPS - Answer (click here)
148. Secure Shell (SSH) - Answer (click here)
149. Wireless Network Security - Answer (click here)
150. IEEE 802.11 Wireless LAN Overview: Wi-Fi Alliance, Protocol
Architecture, Network Components - Answer (click here)
151. IEEE 802.11i Wireless LAN Security - Answer (click here)
152. Wireless Application Protocol Overview - Answer (click here)
153. Wireless Transport Layer Security - Answer (click here)
154. WAP End-to-End Security - Answer (click here)
155. Electronic Mail Security - Answer (click here)
156. Pretty Good Privacy - Answer (click here)
157. S/MIME - Answer (click here)
158. DomainKeys Identified Mail - Answer (click here)
159. IP Security(IPsec) - Answer (click here)
160. IP Security Overview - Answer (click here)
161. IP Security Policy - Answer (click here)
162. Encapsulating Security Payload - Answer (click here)
163. Combining Security Associations - Answer (click here)
164. Internet Key Exchange - Answer (click here)
165. Cryptographic Suites - Answer (click here)
166. Intruders - Answer (click here)
167. Intruders: Behavior Patterns and Techniques - Answer (click here)
168. Intrusion Detection - Answer (click here)
169. Password Management - Answer (click here)
170. Malicious Software - Answer (click here)
171. Types of Malicious Software - Answer (click here)
172. Computer Viruses: Nature, Classification, Virus Kits - Answer (click here)
173. Computer Virus Countermeasures - Answer (click here)
174. Computer or Network Worms - Answer (click here)
175. Distributed Denial of Service Attacks - Answer (click here)
176. Firewalls - Answer (click here)
177. The Need for Firewalls - Answer (click here)
178. Firewall Characteristics and limitations - Answer (click here)
179. Types of Firewalls - Answer (click here)
180. Firewall Basing - Answer (click here)
181. Firewall Location and Configurations - Answer (click here)
182. Legal And Ethical Aspects - Answer (click here)
183. Cybercrime and Computer Crime - Answer (click here)
184. Types of Computer Crime - Answer (click here)
185. Intellectual Property - Answer (click here)
186. Network and Computer Privacy - Answer (click here)
187. Ethical Issues - Network or Computer - Answer (click here)

Vous aimerez peut-être aussi