homework12

Passive attack is to obtain useful information in the system, but does not affect the system performance.
Active attacks attempt to change system resources to affect system performance,

Passive attack to obtain message content, data flow analysis
Active attacks include interruption, tampering, forgery, replay, denial of service

An interrupt is when C intercepts A message sent by A to B, and B ultimately fails to receive the message
Tampering is when C changes the message A sends to B, and B receives A false message
Forgery is the message that C impersonates A to send to B, A itself does not send A message, B receives false message.
Replay is that C sends the old information sent by A before to B again, occupying B’s system resources
Denial of service is C or impersonating A’s IP or sending spam messages to B, filling B’s message queue or asking B to add A’s IP to the blacklist.

————————————————————————————————————
Unconditional security: even if the other side has unlimited computing power can not break the security of the password system.
For example, one at a time.
Computational security: relatively safe to some extent.
The cost of cracking the password is far more than the benefits of cracking the password can not crack the password in the effective time of the information.

Caesar password
Original text: zan
Keys: 3
Results: cdq
The decryption process moves each letter three Spaces to the left

Character table encryption
Original text: zan
Key 😒 = u;
A = b;
N = c;
Results: the ubc
The decryption process is reversed

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值