12/28/2022 0 Comments Matlab ra rbSuppose the user A And the user B In order to verify each other's identities, The following communication protocol is designed :Īmong :RA、RB Random number ,PAB It's a password that both parties have agreed and shared in advance ,“||” Indicates connection operation. Three security goals of cryptography C.I.A What do they mean respectively ?Īccording to the table 2.1 Correspondence of, In affine cryptography, If plaintext is known “E” Corresponding to ciphertext “C", Plaintext “T” Corresponding to ciphertext “F”, The corresponding key=(k1,k2) How much ? The basic objectives of information security include : Authenticity 、 confidentiality 、 integrity 、 Non repudiation 、 Controllability 、 Usability 、 Auditability, etc. ![]() Besides, Cryptography is also used for information authentication 、 Data integrity test 、 Digital signature, etc. ![]() In cryptography, According to the characteristics of the key used in the encryption and decryption process, cryptographic algorithms can be divided into two categories : Symmetric cryptography and asymmetric cryptography. (2) file net.txt What is the numerical representation of authority ?Ĭryptography is the key technology of information security, It is widely used in the field of information security. (1) file net.txt Which user belongs to the system ? Linux In the system, you can use Is Command to view the file, for example : file net.txt The permission properties of are as follows : (2) BLP The access control strategy adopted by the model is read up write down or read down write up ? (1) BLP Does the model guarantee the confidentiality or integrity of information ? What are the three basic elements of information system access control ?īLP Model is a mandatory access control model, Excuse me, : At present, The main access control models include : Autonomous access control (DAC) Model and mandatory access control (MAC) Model. Access control defines the restrictions on the subject's access to the object, And on the basis of identity authentication, Control the resource access requests made by users. ![]() Access control is one of the main strategies to ensure the security of information system, Its main task is to ensure that system resources are not illegally used and unconventional access.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |