博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
《计算机网络 自顶向下方法》(第7版)答案(第八章)(四)
阅读量:4170 次
发布时间:2019-05-26

本文共 1222 字,大约阅读时间需要 4 分钟。

P16

This wouldn’t really solve the problem. Just as Bob

thinks (incorrectly) that he is authenticating Alice in the first half of
Figure 7.14, so too can Trudy fool Alice into thinking (incorrectly) that she
is authenticating Bob. The root of the
problem that neither Bob nor Alice can tell is the public key they are getting
is indeed the public key of Alice of Bob.

P17

在这里插入图片描述

P18

a) No, without a public-private key pair or a

pre-shared secret, Bob cannot verify that Alice created the message.

b) Yes, Alice simply encrypts the message with Bob’s

public key and sends the encrypted message to Bob.

P19

a) client

b) IP:216.75.194.220,port:443
c) 283
d) 3 SSL records
e) 包含了一个加密的主密钥
f) first byte:bc,last byte:29
g) 6
h) 🐴

P20

Again we suppose that SSL does not provide sequence numbers. Suppose that

Trudy, a woman-in-the-middle, deletes a TCP segment. So that Bob doesn’t
anything, Trudy needs to also adjust the sequence numbers in the subsequent
packets sent from Alice to Bob, and the acknowledgment numbers sent from Bob to Alice. The result will be that Bob will, unknowingly, be missing a packet’s
worth of bytes in the byte stream.

P21

No, the bogus packet will fail the integrity check (which uses a shared MAC key).

转载地址:http://dkwai.baihongyu.com/

你可能感兴趣的文章
2018.5.54
查看>>
2018.5.55
查看>>
2018.5.58
查看>>
2018.12.5
查看>>
2018.12.6
查看>>
人智导(四):约束满足问题
查看>>
2018.12.7
查看>>
2018.12.8
查看>>
2018.12.9
查看>>
2018.12.29
查看>>
2018.12.31
查看>>
2019.1.2
查看>>
2019.1.4
查看>>
2019.1.9
查看>>
2019.1.12
查看>>
Java语言程序设计与数据结构》编程练习答案(第二十章)(二)
查看>>
2019.2.25
查看>>
2019.2.26
查看>>
2019.2.27
查看>>
2019.2.28
查看>>