【文章內(nèi)容簡介】
ed that they should be put into paper money to prevent counterfeiting. In the future, a person might be surrounded by a cloud of RFID number that would provide a great deal of information about the person.*Discuss some privacy concerns related to the widespread use of RFID tags.*Discuss security issues, other than privacy, that might arise due to the widespread use of RFID tags.Anwser:(1)Illegal to read the information(非法讀取信息)、Position location tracking(位置定位跟蹤) (2)Interfere with the correct receiving information(干擾正確信息接收)、counterfeiting(偽造假幣);RFID tags offer way to illegal read of the information about customers.位置定位跟蹤.RFID tags could be used to track people39。s movements, determine their identities or make inferences about their habits(用來追蹤人們的動作,確定他們的身份或推斷他們的習(xí)慣):人為的信號干擾使合法的閱讀器不能正常讀取標(biāo)簽數(shù)據(jù);Denial of service :Artificial interference make the legal reader can’t read the label data properly. 重放:根據(jù)竊聽到的閱讀器和標(biāo)簽之間的數(shù)據(jù)通信,重復(fù)之前的通信行為從而獲得信息數(shù)據(jù)。The replay: According to hacking into the data munication between the reader and the tag, repeat previous data munication behavior in order to gain information.13. Decrypt the following message that was encrypted using a simple substitution cipher: WB WI KJB MK RMIT BMIQ BJ RASHMWK RMVP YJERYRKB MKD WBI IWOKWXWVMKVR MKD IJYR YNIB URYMWKNKRASHMWKRD BJ OWER M VJYSHRBR RASHMKMBWJK JKR CJNHD PMER BJLR FNMHWXWRD MKD WKISWURD BJ INVPMK RABRKB BPMB PR VJNHD URMVP BPR IBMBR JXRKHWOPBRKRD YWKD VMSMLHR JX URVJOKWGWKOIJNKDHRII IJNKD MKD IPMSRHRII IPMSR W DJ KJB DRRY YRIRHX BPR XWKMH MNBPJL WBT LNB YT RASRL WRKVRCWBP QMBM PMI HRXB KJ DJNLB BPMB BPR XJHHJCWKO WIBPR SUJSRU MSSHWVMBWJK MKD WKBRUSURBMBWJK WJXXRU YT BPRJUWRI WK BPR PJSR BPMB BPR RIIRKVR JX JQWKMCMK QMUMBR CWHH URYMWK WKBMVB14. This problem deals with digital signatures.*Precisely how is a digital signature puted and verified. *Show that a digital signature provides integrity protection.*Show that a digital signature provides nonrepudiation.答:1. When Sending a message, the sender use a hash function to generate a message digest from the message text , and then the sender use his private key to encrypt it .The encrypted digest will as a digital signature with the message to sent to the receiver. The receiver use the same hash function to pute the message digest from the original use the sender39。s public key to decrypt the additional digital signature. If the two the same, then the receiver can verify the digital signature is the sender.2. Using the algorithm (hash),Ensuring that once the message is changed or replaced,even if only has changed a data,will lead the digest to protect the integrity and authenticity of the message.3. Because only the sender has the private key, so it cannot deny the electronic file is not sent by it.翻譯::計算:發(fā)送報文時,發(fā)送方用一個哈希函數(shù)從報文文本中生成報文摘要,然后用自己的私人密鑰對這個摘要進行加密,這個加密后的摘要將作為報文的數(shù)字簽名和報文一起發(fā)送給接收方。驗證:接收方首先用與發(fā)送方一樣的哈希函數(shù)從接收到的原始報文中計算出報文摘要,接著再用發(fā)送方的公用密鑰來對報文附加的數(shù)字簽名進行解密,如果這兩個摘要相同、那么接收方就能確認(rèn)該數(shù)字簽名是發(fā)送方的。:使用了摘要算法(hash),確保一旦原文還改動或替換(哪怕只已改動了一位數(shù)據(jù)),都會導(dǎo)致摘要的變化,從而保護報文的完整性和真實性。:由于只有發(fā)文者擁有私鑰,所以其無法否認(rèn)該電子文件非由其所發(fā)送.a.計算:報文的發(fā)送方用一個哈希函數(shù)從報文文本中生成報文摘要(散列值)。發(fā)送方用自己的私人密鑰對這個散列值進行加密。然后,這個加密后的散列值將作為報文的附件和報文一起發(fā)送給報文的接收方。驗證:報文的接收方首先用與發(fā)送方一樣的哈希函數(shù)從接收到的原始報文中計算出報文摘要,接著再用發(fā)送方的公有密鑰來對報文附加的數(shù)字簽名進行解密。如果兩個散列值相同、那么接收方就能確認(rèn)該數(shù)字簽名是發(fā)送方的。通過數(shù)字簽名能夠?qū)崿F(xiàn)對原始報文的鑒別。Computing:The sender of a message using a hash function to generate the message digest (hash) from the message text. The sender use its own private key to encrypt the hash value. Then, the encrypted hash value will be sent to the receiver of a message as the attachment of a message with a message. Verifying:The receiver of a message calculate the message digest of the original message by using the same hash function as the sender from receiving, and then use the sender39。s public key to decrypt the digital signature of message the two hash values are the same, then the receiver can verify the digital signature is the sender’s. The identification of the original message can be r