版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)
文檔簡介
COMPUTERFIFTHEDITION
Chapter8NETWORKING
NetworkSecurity
KUROSE-ROSS
Anoteontheuseofthesepptslides:
We'remakingtheseslidesfreelyavailabletoall(faculty,students,readers).
They'reinPowerPointformsoyoucanadd,modify,anddeleteslides
(includingthisone)andslidecontenttosuityourneeds.TheyobviouslyComputerNetworking:
representalotofworkonourpart.Inreturnforuse,weonlyasktheATopDownApproach,
following:th
?Ifyouusetheseslides(e.g.,inaclass)insubstantiallyunalteredform,that5edition.
youmentiontheirsource(afterall,we'dlikepeopletouseourbook!)JimKurose,KeithRoss
?Ifyoupostanyslidesinsubstantiallyunalteredformonawwwsite,that
younotethattheyareadaptedfrom(orperhapsidenticalto)ourslides,andAddison-Wesley,April
noteourcopyrightofthismaterial.2009.
Thanksandenjoy!JFK/KWR
Allmaterialcopyright1996-2010
J.FKuroseandK.W.Ross,AllRightsReserved
NetworkSecurity8-1
Chapter8:NetworkSecurity
Chaptergoals:
understandprinciplesofnetworksecurity:
■cryptographyanditsmanyusesbeyond
''confidentiality11
■authentication
■messageintegrity
?securityinpractice:
■firewallsandintrusiondetectionsystems
■securityinapplication,transport,network,link
layers
NetworkSecurity8-2
Chapter8roadmap
8.1Whatisnetworksecurity?
8.2Principlesofcryptography
8.3Messageintegrity
8.4Securinge-mail
8.5SecuringTCPconnections:SSL
8.6Networklayersecurity:IPsec
8.7SecuringwirelessLANs
8.8Operationalsecurity:firewallsandIDS
NetworkSecurity8-3
Whatisnetworksecur汁y?
Confidentiality:onlysender,intendedreceiver
should''understand11messagecontents
■senderencryptsmessage
■receiverdecryptsmessage
Authentication:sender,receiverwanttoconfirm
identityofeachother
Messageintegrity:sender,receiverwanttoensure
messagenotaltered(intransit,orafterwards)
withoutdetection
Accessandavailability:servicesmustbeaccessible
andavailabletousers
NetworkSecurity8-4
Friendsandenemies:Alice,Bob,Trudy
?:?well-knowninnetworksecurityworld
Bob,Alice(lovers!)wanttocommunicate"securely"
Trudy(intruder)mayintercept,delete,addmessages
AliceBob
channeldata,control
\messages
secure
datasecureadata
senderureceiver
Trudy
NetworkSecurity8-5
WhomightBob,Alicebe?
?...well,real-lifeBobsandAlices!
?Webbrowser/serverforelectronic
transactions(e.g.zon-linepurchases)
on-linebankingclient/server
?DNSservers
?routersexchangingroutingtableupdates
otherexamples?
NetworkSecurity8-6
Therearebadguys(andgirls)outthere!
Q:Whatcana''badguy"do?
A:Alot!Seesection1.6
■eavescfrop:interceptmessages
■activelyinsertmessagesintoconnection
■impersonation:canfake(spoof)sourceaddress
inpacket(oranyfieldinpacket)
■hijacking:''takeover"ongoingconnectionby
removingsenderorreceiver,insertinghimself
inplace
■denialofservicepreventservicefrombeing
usedbyothers(e.g.zbyoverloadingresources)
NetworkSecurity8-7
Chapter8roadmap
8.1Whatisnetworksecurity?
8.2Principlesofcryptography
8.3Messageintegrity
8.4Securinge-mail
8.5SecuringTCPconnections:SSL
8.6Networklayersecurity:IPsec
8.7SecuringwirelessLANs
8.8Operationalsecurity:firewallsandIDS
NetworkSecurity8-8
Thelanguageofcryptography
Alice's8Bobs
K.encryptionKdecryption
fkeyD
|Bkey
encryptionciphertextdecryptionplaintext
plaintextr
algorithmalgorithm
mplaintextmessage
KA(m)ciphertext,encryptedwithkeyKA
m二KB(KA(m))
NetworkSecurity8-9
Simpleencryptionscheme
substitutioncipher:substitutingonethingforanother
■monoalphabeticcipher:substituteoneletterforanother
plaintext:abcdefghijkImnopqrstuvwxyz
I
ciphertext:mnbvcxzasdfghjklpoiuytrewq
EXQJ.Plaintext:bob.iloveyou.alice
ciphertext:nkn.sgktcwky.mgsbc
Key:themappingfromthesetof26letterstothe
setof26letters
NetworkSecurity8-10
Polyalphabeticencryption
nmonoalphabeticciphers,M1/M2/.../Mn
?Cyclingpattern:
■eg,n=4,Miggg.Mg
Foreachnewplaintextsymbol,use
subsequentmonoalphabeticpatternin
cyclicpattern
■dog:dfromAAlzofromAA3/gfromAA4
Key:thenciphersandthecyclicpattern
NetworkSecurity8-11
Breakinganencryptionscheme
Cipher-textonlyKnown-plaintextattack:
attack:TrudyhasTrudyhassome
ciphertextthatsheplaintextcorresponding
cananalyzetosomeciphertext
■
Twoapproaches:e.g.zinmonoalphabetic
cipher,Trudydetermines
■Searchthroughoil
pairingsfora,l,i,ce,b,o,
keys:mustbeableto
differentiateresultingChosen-plaintextattack:
plaintextfromTrudycangetthe
gibberishciphertextforsome
■Statisticalanalysischosenplaintext
NetworkSecurity8-12
TypesofCryptography
Cryptooftenuseskeys:
■Algorithmisknowntoeveryone
■Only"keys"aresecret
Publickeycryptography
■Involvestheuseoftwokeys
Symmetrickeycryptography
■Involvestheuseonekey
Hashfunctions
■Involvestheuseofnokeys
■Nothingsecret:Howcanthisbeuseful?
NetworkSecurity8-13
Symmetrickeycryptography
plaintext
message,m
m=K(K(m))
sss
symmetrickeycrypto:BobandAlicesharesame
(symmetric)key:KS
。e.g.zkeyisknowingsubstitutionpatterninmono
alphabeticsubstitutioncipher
Q:howdoBobandAliceagreeonkeyvalue?
NetworkSecurity8-14
Twotypesofsymmetricciphers
Streamciphers
■encryptonebitattime
Blockciphers
■Breakplaintextmessageinequal-sizeblocks
■Encrypteachblockasaunit
NetworkSecurity8-15
StreamCiphers
pseudorandom
keystream
generator?keystream
。Combineeachbitofkeystreamwithbitof
plaintexttogetbitofciphertext
*m(i)=ithbitofmessage
*ks(i)=ithbitofkeystream
*c(i)=ithbitofciphertext
c(i)=ks(i)十m(i)(十二exclusiveor)
m(i)=ks(i)十c(i)
NetworkSecurity8-16
RC4StreamCipher
RC4isapopularstreamcipher
■Extensivelyanalyzedandconsideredgood
■Keycanbefrom1to256bytes
■UsedinWEPfor802.11
■CanbeusedinSSL
NetworkSecurity8-17
Blockciphers
Messagetobeencryptedisprocessedin
blocksofkbits(e.g.,64-bitblocks).
1-to-lmappingisusedtomapk-bitblockof
plaintexttok-bitblockofciphertext
Examplewithk=3:
inputoutputinputoutput
000110100Oil
001111101010
010101110000
Oil100in001
Whatistheciphertextfor010110001111?
NetworkSecurity8-18
Blockciphers
Howmanypossiblemappingsaretherefor
k=3?
■Howmany3-bitinputs?
■Howmanypermutationsofthe3-bitinputs?
■Answer:40,320;notverymany!
?Ingeneral,2k!mappings;hugefork=64
Problem:
■Tableapproachrequirestablewith264entries,
eachentrywith64bits
Tabletoobig:insteadusefunctionthat
simulatesarandomlypermutedtable
NetworkSecurity8-19
FromKaufman
Prototypefunctioneta1
NetworkSecurity8-20
Whyroundsinprototype?
Ifonlyasingleround,thenonebitofinput
affectsatmost8bitsofoutput.
In2ndround,the8affectedbitsget
scatteredandinputtedintomultiple
substitutionboxes.
Howmanyrounds?
■Howmanytimesdoyouneedtoshufflecards
■Becomeslessefficientasnincreases
NetworkSecurity8-21
Encryptingalargemessage
Whynotjustbreakmessagein64-bit
blocks,encrypteachblockseparately?
■Ifsameblockofplaintextappearstwice,will
givesameciphertext.
Howabout:
■Generaterandom64-bitnumberr(i)foreach
plaintextblockm(i)
■十
Calculatec(i)=Ks(m(i)r(i))
■Transmitc(i),r(i),i=1,2,...
■:十
Atreceiverm(i)=Ks(c(i))r(i)
■Problem:inefficient,needtosendc(i)andr(i)
NetworkSecurity8-22
CipherBlockChaining(CBC)
CBCgeneratesitsownrandomnumbers
■Haveencryptionofcurrentblockdependonresultof
previousblock
■十
c(i)=K5(m(i)c(i-l))
二十
-m(i)Ks(c(i))c(i-l)
Howdoweencryptfirstblock?
■Initializationvector(IV):randomblock二c(0)
■IVdoesnothavetobesecret
?ChangeIVforeachmessage(orsession)
■Guaranteesthatevenifthesamemessageissent
repeatedly,theciphertextwillbecompletelydifferent
eachtime
NetworkSecurity8-23
CipherBlockChaining
。cipherblock:ifinputm(l)=nHTTP/l.r,
t=i
blockrepeated,will
???
producesamecipherm(17)="HTTP/1.1"
text:t=17
?cipherblockchaining:
XORithinputblock,m(i),
withpreviousblockof
ciphertext,c(i-l)
■c(0)transmittedto
receiverinclear
■whathappensin
uHTTP/l.lnscenario
fromabove?
NetworkSecurity8-24
Symmetrickeycrypt。:DES
DES:DataEncryptionStandard
?USencryptionstandard[NIST1993]
。56-bitsymmetrickey,64-bitplaintextinput
。Blockcipherwithcipherblockchaining
。HowsecureisDES?
■DESChallenge:56-bit-key-encryptedphrase
decrypted(bruteforce)inlessthanaday
■Noknowngoodanalyticattack
。makingDESmoresecure:
■3DES:encrypt3timeswith3differentkeys
(actuallyencrypt,decrypt,encrypt)
NetworkSecurity8-25
Symmetrickey
crypt。:DES
—DESoperation
initialpermutation
16identical"rounds"of
functionapplication,
eachusingdifferent
48bitsofkey
finalpermutation
NetworkSecurity8-26
AES:AdvancedEncryptionStandard
?new(Nov.2001)symmetric-keyNIST
standard,replacingDES
processesdatain128bitblocks
?128,192,or256bitkeys
bruteforcedecryption(tryeachkey)
taking1seconDESZtakes149trillion
yearsforAES
NetworkSecurity8-27
PublicKeyCryptography
symmetrickeycryptopublickeycryptography
requiressender,radicallydifferent/
receiverknowsharedapproach[Diffie-
secretkeyHcllman76,RSA78]H
Q:howtoagreeonkeysender,receiverdo
infirstplacenotsharesecretkey
(particularlyifnever?"4/6/2encryptionkey
“met")?knowntoall
privatedecryption
keyknownonlyto
receiver
NetworkSecurity8-28
Publickeycryptography
《Bob'spublic
Bkey
於濘>K-Bob'sprivate
;Bkey
plaintextencryptionciphertext「decryptionplaiptext
algorithmalgorithm
message,mK;(m)message
m=KB(Kg(m))
NetworkSecurity8-29
Publickeyencryptionalgorithms
Requirements:
(T)needK:(?)andK'(?)suchthat
匕
一+D
―m))=m
(2)givenpublickey母,汁shouldbe
impossibletocompute
privatekeyKg
RSA:RivestzShamir,Adelsonalgorithm
NetworkSecurity8-30
Prerequisite:modulararithmetic
xmodn二remainderofxwhendividebyn
?Facts:
[(amodn)+(bmodn)]modn=(a+b)modn
[(amodn)-(bmodn)]modn=(a-b)modn
[(amodn)*(bmodn)]modn=(a*b)modn
Thus
(amodn)dmodn=admodn
Example:x=14,n=10zd=2:
(xmodn)dmodn=42mod10=6
dd
x二1平二196xmod10=6
NetworkSecurity8-31
RSA:gettingready
Amessageisabitpattern.
Abitpatterncanbeuniquelyrepresentedbyan
integernumber.
Thusencryptingamessageisequivalentto
encryptinganumber.
Example
m=10010001.Thismessageisuniquely
representedbythedecimalnumber145.
*Toencryptmzweencryptthecorresponding
number,whichgivesanewnumber(the
ciphertext).
NetworkSecurity8-32
RSA:Creatingpublic/privatekey
pair
1.Choosetwolargeprimenumbersp,q.
(eg,1024bitseach)
2.Computen=pq,z=(p-l)(q-l]
3.Choosee"ithe勿thathasnocommonfactors
withz.(ezzare''relativelyprime").
4.Chooset/suchthated-1isexactlydivisiblebyz.
(inotherwords:ecfmodz=1\
5.Publickeyis(n,e).Privatekeyis(n,d).
NetworkSecurity8-33
RSA:Encryption,decryption
〃⑼
0.Given(/7ze)and(ascomputedabove
1.Toencryptmessagem(<n),compute
c-memodn
2.Todecryptreceivedbitpattern,c,compute
m-c'modn
Magicm_f/nemodn
happens!Y/
c
NetworkSecurity8-34
RSAexample:
Bobchoosesp=5,q=7.Thenn=35,z=24.
e=5(soezzrelativelyprime).
d=29(soed-1exactlydivisiblebyz).
Encrypting8-bitmessages.
e
bitpatternmmc二memodn
encrypt.|oo1224832
OOOOO17
ccd
decrypt:m二cmodn
1748196857210675091509141182522307169712
NetworkSecurity8-35
WhydoesRSAwork?
Mustshowthatcdmodn=m
wherec=memodn
Fact:foranyxandy:xymodn=x(vmodz)modn
■wheren=pqandz=(p-l)(q-l)
Thus,
cdmodn=(memodn)dmodn
=medmodn
=modz)modn
=m1modn
=m
NetworkSecurity8-36
RSA:anotherimportantproperty
Thefollowingpropertywillbeusefullater:
一十_
K(K(m))二m二K(K(m))
BDDDDR
k.______________________/<__________/
usepublickeyuseprivatekey
first,followedfirst,followed
byprivatekeybypublickey
Resultisthesame!
NetworkSecurity8-37
WhyKB(Kg(m))二m二《(6(m))?
Followsdirectlyfrommodulararithmetic:
eded
(mmodn)modn二mmodn
=mdemodn
de
二(mmodn)modn
NetworkSecurity8-38
WhyisRSASecure?
?supposeyouknowBob'spublickey(nze).
Howhardisittodetermined?
essentiallyneedtofindfactorsofn
withoutknowingthetwofactorspandq.
fact:factoringabignumberishard.
GeneratingRSAkeys
?havetofindbigprimespandq
?approach:makegoodguessthenapply
testingrules(seeKaufman)
NetworkSecurity8-39
Sessionkeys
Exponentiationiscomputationallyintensive
?DESisatleast100timesfasterthanRSA
Sessionkey,小
BobandAliceuseRSAtoexchangea
symmetrickeyKs
OncebothhaveKS/theyusesymmetrickey
cryptography
NetworkSecurity8-40
Chapter8roadmap
8.1Whatisnetworksecurity?
8.2Principlesofcryptography
8.3Messageintegrity
8.4Securinge-mail
8.5SecuringTCPconnections:SSL
8.6Networklayersecurity:IPsec
8.7SecuringwirelessLANs
8.8Operationalsecurity:firewallsandIDS
NetworkSecurity8-41
MessageIntegrity
?allowscommunicatingpartiestoverifythat
receivedmessagesareauthentic.
■Contentofmessagehasnotbeenaltered
■Sourceofmessageiswho/whatyouthinkitis
■Messagehasnotbeenreplayed
■Sequenceofmessagesismaintained
let'sfirsttalkaboutmessagedigests
NetworkSecurity8-42
MessageDigests
functionH()that
takesasinputan
arbitrarylength
messageandoutputsa
fixed-lengthstring:desirableproperties:
''messagesignature"■easytocalculate
notethatH()isa■irreversibility:Can't
many-to-1functiondeterminemfromH(m)
■collisionresistance:
*H()isoftencalledacomputationallydifficult
''hashfunction"toproducemandm'such
thatH(m)二H(m')
■seeminglyrandomoutput
NetworkSecurity8-43
工ntarnatchecksum:poormassage
digest
Internetchecksumhassomepropertiesofhashfunction:
/producesfixedlengthdigest(16-bitsum)ofinput
/ismany-to-one
butgivenmessagewithgivenhashvalue,itiseasytofindanother
messagewithsamehashvalue.
■e.g.,:simplifiedchecksum:add4-bytechunksatatime:
messageASCIIformatmessageASC工工format
iou1494F5531Iou9494F5539
00.930302E3900.130302E31
9BOB3942D2429BOB3942D242
B2ciD2differentmessagesC1D2AC
butidenticalchecksums!
NetworkSecurity8-44
HashFunctionAlgorithms
AAD5hashfunctionwidelyused(RFC1321)
■computes128-bitmessagedigestin4-step
process.
。SHA-1isalsoused.
■USstandard[NIST,FIPSPUB180-1]
■160-bitmessagedigest
NetworkSecurity8-45
MessageAuthenticationCode(MAC)
ss=sharedsecret
es
g
aZSZ
sSD
eDS
SS
mSN
ZW
W
?Authenticatessender
?Verifiesmessageintegrity
Noencryption!
Alsocalled''keyedhash"
Notation:AADm=H(s||m);sendm||MDm
NetworkSecurity8-46
HMAC
popularMACstandard
addressessomesubtlesecurityflaws
operation:
■concatenatessecrettofrontofmessage.
■hashesconcatenatedmessage
■concatenatessecrettofrontofdigest
■hashescombinationagain
NetworkSecurity8-47
Example:OSPF
RecallthatOSPFisanAttacks:
intra-ASroutingMessageinsertion
protocol
Messagedeletion
Eachroutercreates
。Messagemodification
mapofentireAS(or
area)andruns
shortestpathHowdoweknowifan
algorithmovermap.OSPFmessageis
*Routerreceiveslink-authentic?
stateadvertisements
(LSAs)fromallother
routersinAS.
NetworkSecurity8-48
OSPFAuthentication
withinanAutonomouscryptographichash
System,routerssendwithAAb5
OSPFmessagesto■64-bitauthentication
eachother.fieldincludes32-bit
OSPFprovidessequencenumber
■
authenticationchoicesAAD5isrunovera
concatenationofthe
■noauthenticationOSPFpacketand
■sharedpassword:sharedsecretkey
insertedinclearin64-■MD5hashthen
bitauthenticationfieldappendedtoOSPF
inOSPFpacketpacket;encapsulatedin
■cryptographichashIPdatagram
NetworkSecurity8-49
End-pointauthentication
wanttobesureoftheoriginatorofthe
message-end-pointauthentication
assumingAliceandBobhaveashared
secret,willMACprovideend-point
authentication?
■wedoknowthatAlicecreatedmessage.
■...butdidshesendit?
NetworkSecurity8-50
Playbackattack
MAC二
Transfer$1Mfrom
BilltoTrudyMAC
NetworkSecurity8-51
Defendingagainstplayback
attack:nonce
UIamAlice"
R
f(msgsR)Transfer$1AA
~fromBilltoSusan
NetworkSecurity8-52
DigitalSignatures
cryptographictechniqueanalogoustohand-
writtensignatures.
。sender(Bob)digitallysignsdocument,
establishingheisdocumentowner/creator.
?goalissimilartothatofMAC,exceptnowuse
public-keycryptography
verifiable,nonforgeab/e\recipient(Alice)can
provetosomeonethatBob,andnooneelse
(includingAlice),musthavesigneddocument
NetworkSecurity8-53
DigitalSignatures
simpledigitalsignatureformessagem:
。Bobsignsmbyencryptingwithhisprivatekey
Kj,creating"signed"message,K£m)
Bob'smessage,m年.吃,PKate《(m)
DearAlice
Bob'smessage,
Oh,howIhavemissedPublickey
you.Ithinkofyouallthem,signed
time!...(blahblahblah)encryption(encrypted)with
algorithmhisprivatekey
BobH
NetworkSecurity8-54
Digitalsignature二signedmessagedigest
Aliceverifiessignatureand
Bobsendsdigitallysignedintegrityofdigitallysigned
message:message:
aencrypted
msgdigest
Ke(H(m))
large
message
mBob'sdigital
signature
K
H:HashB(decrypt)
function
H(m)H(m)
equal
NetworkSecurity8-55
DigitalSignatures(more)
。
supposeAlicereceivesmsgm,digitalsignatureKB^m)
?AliceverifiesmsignedbyBobbyapplyingBob's
publickeyK;toK(m)thenchecksKg(K(m))=m.
+.BB
?二
ifKB(KB(m))m,whoeversignedmmusthaveused
Bob'sprivatekey.
Alicethusverifiesthat:
/Bobsignedm.
/nooneelsesignedm.
/Bobsignedmandnotm\
Non-repudiation:
/Alicecantakem,andsignatureKB(m)to
courtandprovethatBobsignedm.
NetworkSecurity8-56
Public-keycertification
motivation:TrudyplayspizzaprankonBob
■Trudycreatese-mailorder:
DearPizzaStore,Pleasedelivertomefour
pepperonipizzas.Thankyou,Bob
■Trudysignsorderwithherprivatekey
■TrudysendsordertoPizzaStore
■TrudysendstoPizzaStoreherpublickey,but
saysit'sBob'spublickey.
■PizzaStoreverifiessignature;thendelivers
fourpizzastoBob.
■Bobdoesn'tevenlikePepperoni
NetworkSecurity8-57
CertificationAuthorities
。Certificationauthority(CA):bindspublickeyto
particularentity,E.
。E(person,router)registersitspublickeywithCA.
■Eprovides''proofofidentity"toCA.
■CAcreatescertificatebindingEtoitspublickey.
■certificate
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 信用評級方法創(chuàng)新-洞察分析
- 《服飾禮儀》課件
- 醫(yī)院醫(yī)保辦窗口工作總結(jié)范文(6篇)
- 網(wǎng)絡(luò)輿情數(shù)據(jù)挖掘方法-洞察分析
- 咽腔潰瘍診斷標(biāo)準(zhǔn)優(yōu)化-洞察分析
- 水凝膠嬰兒安片制備-洞察分析
- 新冠疫情經(jīng)濟(jì)影響評估-洞察分析
- 余熱回收推廣課件
- 互聯(lián)網(wǎng)金融與創(chuàng)新型小微企業(yè)的完美結(jié)合-融資案例解讀
- 兒童學(xué)習(xí)環(huán)境與家庭教育活動策劃研究
- 2025屆甘肅省武威市重點(diǎn)中學(xué)高三六校第一次聯(lián)考英語試卷含解析
- 2024 年度校長述職報告:堅守教育初心鑄就卓越未來
- 婦女健康教育宣傳內(nèi)容課件
- 2024年度個人工作總結(jié)范文四
- 人教版三年級數(shù)學(xué)上冊復(fù)習(xí)計劃
- 機(jī)電傳動控制自動運(yùn)輸線-課程設(shè)計
- 創(chuàng)業(yè)人生學(xué)習(xí)通超星期末考試答案章節(jié)答案2024年
- 工業(yè)項(xiàng)目投資估算及財務(wù)評價附表(有計算公式)
- 2024年公路造價師繼續(xù)教育在線自測答案共科
- 中國少數(shù)民族文化智慧樹知到期末考試答案章節(jié)答案2024年云南大學(xué)
- 唐宋名家詞智慧樹知到期末考試答案2024年
評論
0/150
提交評論