CRYPTOGRAPHY AND # B R
NETWORK SECURITY: #BR
#BR PRINCIPLES AND #BR
#BR PRACTICE
EIGHTH EDITION #BR
CHAPTERS # B R 1–10
Copyright 2019: William Stallings # b r # b r # b r
© #br2020 #brPearson #brEducation, #brInc., #brHoboken, #brNJ. #brAll #brrights #brreserved. #brThis #brmaterial #bris #brprotected #brunder #brall #brcopyright
#brlaws #br
No as#br#brportion
they #br # bcurrently b r exist.
r of # br this ##br S C H OLA R V A U L T
material # b r may # b r be # b r reproduced, in an y # b r form or #b r by # br a n y m e a n s , w i t h o u t # b r permission
# b r in # b r writing # b r from # b r the # b r publisher.
, © 2019 by William Stallings
#br #br #br #br
All rights reserved. No part
#br #br #br #br
of this document may be
#br #br #br #br #br
reproduced, in any form
#br #br #br #br
or by any means, or
#br #br #br #br #br
posted on the Internet,
#br #br #br #br
without permission in
#br #br #br
writing from the author.
#br #br #br #br
Selected solutions may be
#br #br #br #br
shared with students,
#br #br #br
provided that they are not
#br #br #br #br #br
available, unsecured, on
#br #br #br
the Web.
#br #br
-2-
© #br2020 #brPearson #brEducation, #brInc., #brHoboken, #brNJ. #brAll #brrights #brreserved. #brThis #brmaterial #bris #brprotected #brunder #brall #brcopyright
#brlaws #br
No as#br#brportion
they #br # bcurrently b r exist.
r of # br this ##br S C H OLA R V A U L T
material # b r may # b r be # b r reproduced, in an y # b r form or #b r by # br a n y m e a n s , w i t h o u t # b r permission
# b r in # b r writing # b r from # b r the # b r publisher.
, TABLE #brOF #brCONTENTS
NOTICE
This manual contains solutions to the
#br #br #br #br #br
review questions and homework problems
#br #br #br #br #br
in Cryptography and Network Security,
#br #br #br #br #br
Eighth Edition. If you spot an error in a
#br #br #br #br #br #br #br #br #br
solution or in the wording of a problem,
#br #br #br #br #br #br #br #br
I would greatly appreciate it if you
#br #br #br #br #br #br #br
would forward the information via email
#br #br #br #br #br #br
to . An errata sheet for
#br #br #br #br #br #br
this manual, if needed, is available at
#br #br #br #br #br #br #br
https://www.box.com/shared/nh8hti5167
#br
File name is S-Crypto8e-mmyy.
#br #br #br #br
W.S.
Chapter #br1 # b r Introduction ......................................................... 5
Chapter #br2 # b r Introduction #brto #brNumber #brTheory .......................... 8
Chapter #br3 # b r Classical #brEncryption #brTechniques .......................... 16
Chapter #br4 # b r Block #brCiphers #brand #brthe #brData #brEncryption #brStandard 25
Chapter #br5 # b r Finite #brFields....................................................... 35
Chapter #br6 # b r Advanced #brEncryption #brStandard ........................... 41
Chapter #br7 # b r Block #brCipher #brOperation ..................................... 48
Chapter #br8 # b r Random #brand #brPseudorandom #brNumber #brGeneration
#brand #brStream #brCiphers ............................................................. 54
Chapter #br9 # b r Public-Key #brCryptography #brand #brRSA .................... 62
Chapter #br10 # b r Other #brPublic-Key #brCryptosystems ....................... 70
-3-
© #br2020 #brPearson #brEducation, #brInc., #brHoboken, #brNJ. #brAll #brrights #brreserved. #brThis #brmaterial #bris #brprotected #brunder #brall #brcopyright
#brlaws #br
No as#br#brportion
they #br # bcurrently b r exist.
r of # br this ##br S C H OLA R V A U L T
material # b r may # b r be # b r reproduced, in an y # b r form or #b r by # br a n y m e a n s , w i t h o u t # b r permission
# b r in # b r writing # b r from # b r the # b r publisher.
, -4-
© #br2020 #brPearson #brEducation, #brInc., #brHoboken, #brNJ. #brAll #brrights #brreserved. #brThis #brmaterial #bris #brprotected #brunder #brall #brcopyright
#brlaws #br
No as#br#brportion
they #br # bcurrently b r exist.
r of # br this ##br S C H OLA R V A U L T
material # b r may # b r be # b r reproduced, in an y # b r form or #b r by # br a n y m e a n s , w i t h o u t # b r permission
# b r in # b r writing # b r from # b r the # b r publisher.