首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
admin
2023-02-13
56
问题
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of messages may have a different key than others.A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Each distinct pair of communicating parties must,ideally,share a different key,and perhaps each ciphertext exchanged as well.The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret.The difficulty of securely establishing a secret ________between two communicating parties,when a secure channel doesn’t already exist between them,also presents a chicken—and—egg problem which is a considerable practical obstacle for cryptography users in the real world.
Whitfield Diffie and Martin Hellman,authors of the first paper on public—key cryptography.
In a groundbreaking 1 976 paper,Whitfield Diffie and Martin Hellman proposed the notion of public—key(also,more generally,called asymmetric key)cryptography in which two different but mathematically related keys are used——a public key and a private key.A public key system is so constructed that calculation of one key(the private key)is computationally infeasible ________ the other(the public key),even though they are necessarily related.Instead,both keys are generated secretly,as an interrelated pair.The historian David Kahn described public—key cryptography as “the most revolutionary new concept in the field since poly—alphabetic substitution emerged in the Renaissance”.
In public-key cryptosystems,the ________ key may be freely distributed,while its paired private key must remain secret.The public key is typically used for encryption,while the private or secret key is used for decryption.Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie—Hellman key exchange protocol.
In 1978,Ronald Rivest,Adi Shamir,and Len Adleman invented ________,another public—key system.
In 1997,it finally became publicly known that asymmetric key cryptography had been invented by James H.Ellis at GCHQ,a British intelligence organization,and that,in the early 1970s,both the Diffie—Hellman and RSA algorithms had been previously developed(by Malcolm J.Williamson and Clifford Cocks,respectively).
④
选项
A、public
B、private
C、symmetric
D、asymmetric
答案
A
解析
转载请注明原文地址:https://kaotiyun.com/show/6F0D777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
某公司准备举办趣味运动会,对于运动会采用何种形式,甲、乙、丙三人意见如下:甲:如果采用托球跑、两人三足跑,那么单腿斗鸡和螃蟹赛跑不能都采用。乙:如果单腿斗鸡和螃蟹赛跑不都采用,那就采用托球跑和两人三足跑。丙:托球跑和两人三足跑不都采用。
北京农业大学的教授在河北省推广柿树剪枝技术时,为了说服当地的群众,教授把一块柿树园一劈为二,除自然条件相同外,其他的条件包括施肥、灭虫、浇水、除草等都相同,不同的是:其中一块柿树园剪枝,而另一块不剪枝。到收获季节,剪枝的一块柿树园的产量比不剪枝的多三成以上
论说文:根据下述材料,写一篇700字左右的论说文,题目自拟。从4月至今,瑞幸一路崩塌,曝出虚增22亿元销售额,股价暴跌、高管下课、两国调查。出生时含着金钥匙,满腔抱负;上市时被追捧为“中国的星巴克”,和国际品牌打擂台,志得意满;暴雷后被华尔街、监
美国射击选手埃蒙斯是赛场上的“倒霉蛋”。在2004年雅典奥运会男子步枪决赛中,他在领先对手3环的情况下将最后一发子弹打在了别人的靶上,失去了即将到手的奖牌。然而,他却得到美丽的捷克姑娘卡特琳娜的安慰,最后赢得了爱情。这真是应了一句俗语:如果赛场失意,那么情
根据最近一次的人口调查分析:所有北美洲人都是美洲人;所有美洲人都是白人;所有亚洲人都不是美洲人;所有印尼人都是亚洲人。根据以上陈述,可以推知以下哪项不一定是真的?
张珊:尽管本地区几年来中学招生人数持续下降,但是小学招生人数却在大幅增加。因此,地区校务委员会提出建造一所新的小学。李思:另一个方案可以是将一些中学教室临时改为小学学生教室。下面哪项如果正确,则最有助于支持李思的可替换方案?
在某项体育比赛中评委给一位同学打出的分数为:90,89,90,95,93,94,93,去掉一个最高分和一个最低分后,所剩数据的平均值和方差分别为()。
马克思在《资本论》中指出:“资本来到世问,从头到脚,每个毛孔都滴着血和肮脏的东西。”因此,扩大再生产过程中的追加资本,一开始就没有一个价值原子不是由别人的无酬劳动产生的。这表明()
用配方法化下列二次型为标准形:f(x1,x2,x3)=x12+2x22-5x32+2x1x2-2x1x3+2x2x3.
阅读下列案例内容,回答并计算问题1至问题4,将解答填入答题纸的对应栏内。【说明】A公司新接到一个IDC运营商B的服务需求,服务对象包括数十台的网络设备和存储设备,以及一个机房的空调和柴发装置。但A公司的服务能力主要在IT设备领域,基础设施服务没有积累。
随机试题
新生儿厌氧菌感染常发生于
关于施工合同解除的说法,正确的是()。
()是贷款项目分析的核心工作和贷款决策的重要依据。
已知最早的纸本绘画《地主庄园图》出土于()。
下列属于操作技能的是()。
若变量a未事先定义而直接使用(例如:a=0),则变量a的类型是()。
A、说起来,我应该算是个十足的幸运儿。B、浙江省博物馆始建于1929年,是一座综合性人文科学博物馆。C、全世界有10%的陆地是沙漠,总面积到达1535万平方千米。D、价格按照管理形式可分为指令性价格、指导性价格、自由价格几种。CC。动词误用。“到达
Norevolutionsintechnologyhaveasvisiblymarkedthehumanconditionasthoseintransport.Movinggoodsandpeople,theyhav
【B1】【B5】
Intheearly20thcentury,fewthingsweremoreappealingthanthepromiseofscientificknowledge.Inaworldstrugglingwithr
最新回复
(
0
)