Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
xác thực thông báo hội đồng quản trị hệ thống (BBS) gọi lại mật mã bảo mật mã dữ liệu Encryption Standard (DES) mã hóa tập tin bức tường lửa của tin tặc tấn công máy tính lớn hoạt động mật khẩu hệ thống giao thức private key mã hóa khóa công khai (PKE) thẻ thông minh niềm tin nhà cung cấp Unix người sử dụng tài khoản sâu virus Windows | Encryption and Authentication 51 An example of a replay attack against a biometric algorithm would be the recording and playback of a person s pass phrase. Without replay detection there would be no way for the sensing algorithm to determine that a recording and not the authorized user s actual voice was being used to gain access to the system. Biometric sensors usually must include additional hardware to ensure that they are not being faked by a replay attack. This usually includes sensors to verify that other requirements of the system are actually in place. For example a fingerprint scanner doesn t allow access for a person it allows access for a fingerprint. They can be fooled by something as simple as a color photograph of a valid fingerprint. What the system designers really want to do is prove that the person with the fingerprint is the one accessing the system so they must include live finger detection in addition to fingerprint detection. Therefore the system could include other simple biometric sensors such as temperature pulse and even blood oxygen sensors that would be extraordinarily difficult to fake. Terms to Know pass phrase A very long password consisting of multiple words. algorithm pass phrase asymmetric algorithms password Authentication private key biometric authentication pseudorandom number generator PRNG brute-force pseudorandom numbers certificate public key challenge response public key authentication ciphers public key encryption cryptography replay attack cryptosystems Root Certifying Authority Root CA digital signatures secret key encryption secret key encryption hash seed hybrid cryptosystems sessions symmetrical algorithms key one-way functions 52 Chapter 3 Review Questions 1. What is the primary purpose of encryption 2. Secret key encryption is said to be symmetrical. Why 3. What is a hash 4. What is the most common use for hashing algorithms 5. What is the difference between public key encryption and secret key encryption 6. What .