首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
admin
2023-02-13
85
问题
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of messages may have a different key than others.A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Each distinct pair of communicating parties must,ideally,share a different key,and perhaps each ciphertext exchanged as well.The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret.The difficulty of securely establishing a secret ________between two communicating parties,when a secure channel doesn’t already exist between them,also presents a chicken—and—egg problem which is a considerable practical obstacle for cryptography users in the real world.
Whitfield Diffie and Martin Hellman,authors of the first paper on public—key cryptography.
In a groundbreaking 1 976 paper,Whitfield Diffie and Martin Hellman proposed the notion of public—key(also,more generally,called asymmetric key)cryptography in which two different but mathematically related keys are used——a public key and a private key.A public key system is so constructed that calculation of one key(the private key)is computationally infeasible ________ the other(the public key),even though they are necessarily related.Instead,both keys are generated secretly,as an interrelated pair.The historian David Kahn described public—key cryptography as “the most revolutionary new concept in the field since poly—alphabetic substitution emerged in the Renaissance”.
In public-key cryptosystems,the ________ key may be freely distributed,while its paired private key must remain secret.The public key is typically used for encryption,while the private or secret key is used for decryption.Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie—Hellman key exchange protocol.
In 1978,Ronald Rivest,Adi Shamir,and Len Adleman invented ________,another public—key system.
In 1997,it finally became publicly known that asymmetric key cryptography had been invented by James H.Ellis at GCHQ,a British intelligence organization,and that,in the early 1970s,both the Diffie—Hellman and RSA algorithms had been previously developed(by Malcolm J.Williamson and Clifford Cocks,respectively).
④
选项
A、public
B、private
C、symmetric
D、asymmetric
答案
A
解析
转载请注明原文地址:https://kaotiyun.com/show/6F0D777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
在最近召开的关于北海环境污染问题的会议上,大多数与会国都同意对流入北海的水质采取统一的质量控制,不管环境污染是否是因为某一特定流入源造成的。当然,为了避免过分僵化的控制,为完成上述段落,横线的部分补充以下哪项最为合适?
美国斯坦福大学梅丽莎·莫尔博士在《天哪:脏话简史》一书中谈到一个有趣的现象:有些患阿尔茨海默症或中过风的病人在彻底丧失语言能力后,仍能反复说出某句脏话。这不免令人感到困惑:难道说脏话不是在说话吗?如果以下陈述为真,则哪一项能最好地解释上述现象?
S城的人非常喜欢喝酒,经常出现酗酒闹事事件,影响了S城的治安环境。为了改善城市的治安环境,市政府决定:减少S城烈酒的产量。以下哪项最能对市政府的决定进行质疑?
某市要建花园或修池塘,已知:修了池塘就要架桥,架了桥就不能建花园,建花园必须植树,植树必须架桥。若以上信息为真,则以下哪项不可能为真?
△ABC中,AB=5,AC=3,∠A=x,当x在(0,π)中变化时,该三角形BC边上的中线长取值的范围是()。
刘翔在出征奥运会前进行110米跨栏训练,教练对他10次的训练成绩进行统计分析,判断他的成绩是否稳定,则教练需要知道刘翔这10次成绩的()。
1956年9月15日至27日,中国共产党第八次全国代表大会在北京举行。毛泽东致开幕词,刘少奇作政治报告,周恩来作关于国民经济发展第二个五年计划建议的报告,邓小平作关于修改党章的报告。中共八大正确分析了()
马克思在《资本论》中指出:“资本来到世问,从头到脚,每个毛孔都滴着血和肮脏的东西。”因此,扩大再生产过程中的追加资本,一开始就没有一个价值原子不是由别人的无酬劳动产生的。这表明()
应用凸函数概念证明如下不等式:对任何非负实数a,b,有2arctan()≥arctana+arctanb.
Here’sacommonscenariothatanynumberofentrepreneursfacetoday:you’retheCEOofasmallbusinessandthoughyou’remakin
随机试题
房室交界性逸搏心律见于室性逸搏或逸搏心律见于
男,60岁,胃痛史半年,近来大便潜血持续阳性。应考虑
“寒者热之”属于
污水处理常用的活性污泥法有()。
下列各项中,可用来筹集短期资金的筹资方式是( )。
明适应是指由暗处到亮处,特别是强光下,最初一瞬间会感到光线刺眼发眩,几乎看不清外界事物,几秒钟之后逐渐看清物品。暗适应是指从光亮处进入暗处,人眼对光的敏感度逐渐增加。根据上述定义,下列属于暗适应的是:
下列说法正确的是()。
一项对独立制作影片的消费调查表明,获得最高评价的动作片的百分比超过了获得最高评价的爱情片的百分比。但是,调查方由此得出的电影主题决定了影片的受欢迎程度的结论却很可能是错误的,因为动作片都是由那些至少拍过一部热门影片的导演执导,而爱情片都是由较新的导演制作,
第1台计算机ENIAC在研制过程中采用了哪位科学家的两点改进意见
PASSAGETWOWhatdothecasesofTarget,AdobeandeBayinPara.3show?
最新回复
(
0
)