首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
admin
2023-02-13
70
问题
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of messages may have a different key than others.A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Each distinct pair of communicating parties must,ideally,share a different key,and perhaps each ciphertext exchanged as well.The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret.The difficulty of securely establishing a secret ________between two communicating parties,when a secure channel doesn’t already exist between them,also presents a chicken—and—egg problem which is a considerable practical obstacle for cryptography users in the real world.
Whitfield Diffie and Martin Hellman,authors of the first paper on public—key cryptography.
In a groundbreaking 1 976 paper,Whitfield Diffie and Martin Hellman proposed the notion of public—key(also,more generally,called asymmetric key)cryptography in which two different but mathematically related keys are used——a public key and a private key.A public key system is so constructed that calculation of one key(the private key)is computationally infeasible ________ the other(the public key),even though they are necessarily related.Instead,both keys are generated secretly,as an interrelated pair.The historian David Kahn described public—key cryptography as “the most revolutionary new concept in the field since poly—alphabetic substitution emerged in the Renaissance”.
In public-key cryptosystems,the ________ key may be freely distributed,while its paired private key must remain secret.The public key is typically used for encryption,while the private or secret key is used for decryption.Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie—Hellman key exchange protocol.
In 1978,Ronald Rivest,Adi Shamir,and Len Adleman invented ________,another public—key system.
In 1997,it finally became publicly known that asymmetric key cryptography had been invented by James H.Ellis at GCHQ,a British intelligence organization,and that,in the early 1970s,both the Diffie—Hellman and RSA algorithms had been previously developed(by Malcolm J.Williamson and Clifford Cocks,respectively).
①
选项
A、different
B、same
C、public
D、private
答案
B
解析
转载请注明原文地址:https://kaotiyun.com/show/2F0D777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
若一元二次方程ax2+bx+c=0(a≠0)的一个根是另一个根的两倍,则a,b,c之间的关系为()。
评论家:随着对员工进行电子监控的做法越来越普遍,由此对个人隐私越来越具有侵犯性,我也听到了越来越多来自雇主方面对这种做法的辩护。他们解释说,监控是为了使员工保持诚实、高效和对顾客的礼貌。我认为,这种解释显然是为雇主自己服务的,根本不能表明对个人隐私的无理侵
华东公司的财务部长和副部长都是硕士研究生,公司45岁以下的职员中,硕士研究生超过91%,45岁以上的有6名硕士研究生。如果以上陈述都是真的,则最能推出以下哪项?
如果无能力晋升,当然不谋求晋升;如果有能力晋升,但无能力胜任,也决不谋求晋升。如果以下五人都认同以上断定,则哪种情况不可能出现?
某小组有4名男同学和3名女同学,从这小组中选出4人完成三项不同的工作,其中女同学至少选2名,每项工作要有人去做,那么不同的选派方法有()。
从5位男教师和4位女教师中选出3位教师,派到3个班担任班主任(每班1位班主任),要求这3位班主任中男、女教师都要有,则不同的选派方案共有()。
有甲、乙、丙三项任务,任务甲需2人承担,任务乙、丙各需1人承担,从10人中选派4人承担这三项任务,不同的选法共有()。
中国特色社会主义法律体系是以我国全部现行法律规范按照一定的标准和原则划分为不同的法律部门,并由这些法律部门所构成的具有内在联系的统一整体。每一法律部门均由一系列调整相同类型社会关系的众多法律、法规所构成。下列属于程序法律部门的是()
Mostmalesintheanimalkingdomdolittleparenting.Sometimes,though,parentalinvestmentbyamalepaysoff.Songbirdchicks
阅读下列案例内容,回答并计算问题1至问题4,将解答填入答题纸的对应栏内。【说明】A公司新接到一个IDC运营商B的服务需求,服务对象包括数十台的网络设备和存储设备,以及一个机房的空调和柴发装置。但A公司的服务能力主要在IT设备领域,基础设施服务没有积累。
随机试题
侵犯著作权的法律责任
求微分方程的通解.
患者女性,35岁,肛周反复流脓半年,脓质稠厚,肛门胀痛,肛旁截石位10点距肛缘2厘米有一溃口,舌红,苔黄,脉滑。
患者胡某,女,25岁。昨日始小便频数,尿液浑赤,尿道热涩刺痛;尿常规检查镜下红细胞满视野;舌红,脉数。治宜选用()
直线(x≥0)与y=H及y轴所围图形绕y轴旋转一周所得旋转体的体积为()(H,R为任意常数)。
正赶赴火场的消防队、消防车、消防器材和装备要铁路运输或轮渡时,铁路和航运部门应免费优先载运,这体现行政主体享有()。
将一个三位数的个位数字和百位数字调换后所得的三位数与原三位数的和是1070,差是198,这个三位数是()。
计算二重积分其中积分区域为D={(x,y)||x|≤1,0≤y≤2}.
Readthefollowingtextanddecidewhichanswerbestfitseachspace.Forquestions26-45,markoneletterA,B,CorDony
A、Inordertoelevatetheirnests.B、Inordertolivemorecomfortably.C、Inordertoavoidpredators.D、Inordertomakeincuba
最新回复
(
0
)