阿摩線上測驗
登入
首頁
>
研究所、轉學考(插大)◆資訊安全概論
>
109年 - 109 教育部公費留學考試試題:資訊安全概論#125729
>
1. 在網際網路(Internet)中,何謂被動式攻擊(Passive Attack)?
其他申論題
5. [15%] Solve the recurrence equation given by:an+2 - 2an + an+1 = 0, a0 = 0, a1 = 1.
#534206
6. [15%] Which of the following graphs, K6 (complete graph with 6 vertices) or K7 (complete graph with 7 vertices) has closed Euler walk? Explain your answer as clear as possible. That is, in closed Euler walk, we allow each edge to be visited exactly once, and the initial vertex and ending vertex are the same. Can we modify the graph(s) to make it/them possible to contain a closed Euler walk?
#534207
Def 1.A tree consists of a root, and zero or more subtrees T1, T2, ..., Tk. Also, there is an edge from the root to the rootof each subtree.
#534208
Now someone modifies the definition and give the following alternative one:Def 2.A tree consists of a root, and one or more subtrees T1, T2,..., Tk. Also, there is an edge from the root to the root of each subtree.Can you describe what will happen if we choose the second one as the definition instead? What trees can be generated by the two definitions?
#534209
2. 何謂主動式攻擊(Active Attack)?
#534211
3. 被動式攻擊包含哪些攻擊方法(請具體描述每個攻擊方法及是針對 Confidentiality、Integrity、Availability 哪一項的攻擊)?
#534212
4. 主動式攻擊包含哪些攻擊方法(請具體描述每個攻擊方法及是針對 Confidentiality、Integrity、Availability 哪一項的攻擊)?
#534213
二、現代的Block Ciphers,有5種 Modes of Operation 被設計用來做為實務上 Block Ciphers 加解密使用。請描述這5種Modes of Operation的名稱、作法及優缺點,你可以用圖形輔助說明。
#534214
(1)若有兩個隨機大整數各自通過這兩個質數測試演算法,在意義上有何不同(請說明理由)?
#534215
(2)另請寫出 Miller-Rabin 質數測試演算法或AKS演算法(二者擇一,寫出Pseudocode)。
#534216