《计算机网络 自顶向下方法》(第7版)答案(第八章)(二)

本节详细解答了《计算机网络 自顶向下方法》(第7版)第八章的部分题目,涉及IP地址、RSA加密解密及实际应用。通过实例解析了网络中位运算、密钥生成与加密过程。
摘要由CSDN通过智能技术生成

P5

中文依然是屑翻译,按英文版做
a) There are 8 tables. Each table has 28 entries. Each
entry has 8 bits.

number of tables * size of each table * size
of each entry = 828 8= 214 bits

b) There are 264 entries. Each entry has 64 bits. 271
bits

P6

a) 011011011
b) 该密文对应的明文由三个相同bit组成
c)
c(i) = KS(m(i) XOR c(i-1))

c(1) =KS(100 XOR 111) = KS (011) = 100

c(2) =KS(100 XOR 100) = KS (000) = 110

c(1) =KS(100 XOR 110) = KS (010) = 101

P7

a) We are given p=3 and q=11

We thus have n=33 and q=11

Choose e=9 (it might be a good idea to give students a hint that 9 is a good value to choose, since the resulting calculations are less likely to run into numerical stability problems than other choices for e) since 3 and (p-1)(q-1)=20 h

评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值