首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
admin
2023-02-13
94
问题
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of messages may have a different key than others.A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Each distinct pair of communicating parties must,ideally,share a different key,and perhaps each ciphertext exchanged as well.The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret.The difficulty of securely establishing a secret ________between two communicating parties,when a secure channel doesn’t already exist between them,also presents a chicken—and—egg problem which is a considerable practical obstacle for cryptography users in the real world.
Whitfield Diffie and Martin Hellman,authors of the first paper on public—key cryptography.
In a groundbreaking 1 976 paper,Whitfield Diffie and Martin Hellman proposed the notion of public—key(also,more generally,called asymmetric key)cryptography in which two different but mathematically related keys are used——a public key and a private key.A public key system is so constructed that calculation of one key(the private key)is computationally infeasible ________ the other(the public key),even though they are necessarily related.Instead,both keys are generated secretly,as an interrelated pair.The historian David Kahn described public—key cryptography as “the most revolutionary new concept in the field since poly—alphabetic substitution emerged in the Renaissance”.
In public-key cryptosystems,the ________ key may be freely distributed,while its paired private key must remain secret.The public key is typically used for encryption,while the private or secret key is used for decryption.Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie—Hellman key exchange protocol.
In 1978,Ronald Rivest,Adi Shamir,and Len Adleman invented ________,another public—key system.
In 1997,it finally became publicly known that asymmetric key cryptography had been invented by James H.Ellis at GCHQ,a British intelligence organization,and that,in the early 1970s,both the Diffie—Hellman and RSA algorithms had been previously developed(by Malcolm J.Williamson and Clifford Cocks,respectively).
④
选项
A、public
B、private
C、symmetric
D、asymmetric
答案
A
解析
转载请注明原文地址:https://kaotiyun.com/show/6F0D777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
张教授:除非所有的驾驶员都必然遵守交通规则,否则有些驾车导致的纠纷可能难以避免。李研究员:我不同意你的看法。以下哪一项确切地表达了张教授的看法?
如图5-1所示,三角形ABC的面积是24,且BE=2EC,D,F分别是AB,CD的中点,那么阴影部分的面积是()。
节能灯所需要的电能少,比较省电。所以,如果人们都只用节能灯,不用耗电多的普通白炽灯,那就会节省不少电费。以下哪项陈述是上面论证所依赖的假设?
长途汽车从A站出发,匀速行驶,1小时后突然发生故障,车速降低了40%,到B站终点延误达3小时,若汽车再多跑50公里后才发生故障,坚持行驶到B站能少延误1小时20分钟,那么A,B两地相距()公里。
两个正整数甲数和乙数的最大公约数是6,最小公倍数是90,如果甲数是18,那么乙数是m,则m的各个数位上数字之和为()。
在100件产品中有6件次品,现从中任取3件产品,至少有1件次品的不同取法有()。
已知等差数列{an}的公差不为0,但第三、四、七项构成等比数列,则(a2+a6)/(a3+a7)=()。
平面内有两组平行线,一组有m条,另一组有n条,这两组平行线相交,构成的平行四边形有()。
结合材料回答问题:材料1“七一勋章”颁授仪式举行时,72岁的黄忠杰在广西壮族自治区百色市田阳区(原田阳县)田州镇的家中守在电视机前。当会场广播念到女儿黄文秀的名字时,黄忠杰和妻子黄彩勤热泪盈眶。“这是党中央对黄文秀工作的高度评价和认可,我们感到
随机试题
光明化工厂委托黄河大学化工系教授刘强为该厂研发一套污水净化方法。刘强在业余时间利用学校实验设备研制出一套净水方法,并向学校交付了设备使用费。光明化工厂为此提供了10万元研发资金。双方对其他事宜未作约定。根据黄河大学的科研管理制度,科研人员利用本校实验设备和
有关巨噬细胞作用的描述,错误的是
A.二相气雾剂B.三相气雾剂C.四相气雾剂D.五相气雾剂E.六相气雾剂气雾剂的分类中,按照处方组成分类,乳浊液型气雾剂属于
采购方对产品进行过程质量控制,以保证产品质量达到招标时的要求,可在合同中指出的条款包括()。
就正应力强度而言,以下梁中,哪个图所示的加载方式最好?
票据背书附有条件的,所附条件不具有票据上的效力。()
2017年8月某日。某地高速公路交警支队j大队民警吴某在处理一起车辆追尾交通事故时,追尾机动车驾驶员数次向处理交通事故民警塞钱,吴某严词拒绝,并按照有关交通法规予以处罚。吴某的做法彰显了()。
【阿兹特克文化】
“三个”中“三”的正确读音是_______。(苏州大学)
Personalityistoalargeextentinherent—A-typeparentsusuallybringaboutA-typeoffspring.【F1】Buttheenvironmentmustalso
最新回复
(
0
)