首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
admin
2023-02-13
72
问题
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of messages may have a different key than others.A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Each distinct pair of communicating parties must,ideally,share a different key,and perhaps each ciphertext exchanged as well.The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret.The difficulty of securely establishing a secret ________between two communicating parties,when a secure channel doesn’t already exist between them,also presents a chicken—and—egg problem which is a considerable practical obstacle for cryptography users in the real world.
Whitfield Diffie and Martin Hellman,authors of the first paper on public—key cryptography.
In a groundbreaking 1 976 paper,Whitfield Diffie and Martin Hellman proposed the notion of public—key(also,more generally,called asymmetric key)cryptography in which two different but mathematically related keys are used——a public key and a private key.A public key system is so constructed that calculation of one key(the private key)is computationally infeasible ________ the other(the public key),even though they are necessarily related.Instead,both keys are generated secretly,as an interrelated pair.The historian David Kahn described public—key cryptography as “the most revolutionary new concept in the field since poly—alphabetic substitution emerged in the Renaissance”.
In public-key cryptosystems,the ________ key may be freely distributed,while its paired private key must remain secret.The public key is typically used for encryption,while the private or secret key is used for decryption.Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie—Hellman key exchange protocol.
In 1978,Ronald Rivest,Adi Shamir,and Len Adleman invented ________,another public—key system.
In 1997,it finally became publicly known that asymmetric key cryptography had been invented by James H.Ellis at GCHQ,a British intelligence organization,and that,in the early 1970s,both the Diffie—Hellman and RSA algorithms had been previously developed(by Malcolm J.Williamson and Clifford Cocks,respectively).
④
选项
A、public
B、private
C、symmetric
D、asymmetric
答案
A
解析
转载请注明原文地址:https://kaotiyun.com/show/6F0D777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
从4名男生3名女生中选择4人参加老吕暑假集训营,若这4个人中既有男生又有女生,则不同的选法有()种。
若一元二次方程ax2+bx+c=0(a≠0)的一个根是另一个根的两倍,则a,b,c之间的关系为()。
论证有效性分析:分析下述论证中存在的缺陷和漏洞,选择若干要点,写一篇600字左右的文章,对该论证的有效性进行分析和评论。(论证有效性分析的一般要点是:概念特别是核心概念的界定和使用是否准确并前后一致,有无各种明显的逻辑错误,论证的论据是否成立并支持结论,结
如果无能力晋升,当然不谋求晋升;如果有能力晋升,但无能力胜任,也决不谋求晋升。如果以下五人都认同以上断定,则哪种情况不可能出现?
某公司有46名会计人员,对于他们是否拥有高级会计师证和注册会计师证,有以下调查结果:有高级会计师证的有22人,两种证书都没有的有14人,只有注册会计师证的与两种证书都有的人数之比为5:3.则只有高级会计师证的人员有()名。
一组数据的方差是2,将这组数据中的每一个数据都扩大3倍,则所得一组新数据的方差是()。
某校规定学生的学期体育成绩由三部分组成:体育课外活动占10%,理论测试占30%,体育技能测试占60%,一名同学的上述成绩依次为90,92,73,则该同学这学期的体育成绩为()。
一射手对同一目标独立进行4次射击,若至少命中一次的概率是,则该射手的命中率是()。
简述中共党内屡次出现严重“左”倾错误的原因。
Here’sacommonscenariothatanynumberofentrepreneursfacetoday:you’retheCEOofasmallbusinessandthoughyou’remakin
随机试题
下列关于权力导向型企业的说法中,不正确的是()。
国家工作人员挪用救灾款归个人使用的,()。
试述水土流失的预防措施。
合同磋商的内容。
会计人员每年接受培训的时间,累计不少于()
男性,30岁,左小腿上段有一窦道,反复流脓,排碎骨块12年,近半个月发热,伤口红肿流脓,X线片显示:左胫骨上段增粗,见死骨,其周围有新生骨。在应用抗生素的同时给予
咳铁锈色痰最常见的疾病是
房地产企业是吸纳金融机构信贷资金最多的行业。()
设f(χ,y)=(1)f(χ,y)在点(0,0)处是否连续?(2)f(χ,y)在点(0,0)处是否可微?
Whattimeisitnow?
最新回复
(
0
)