首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
admin
2023-02-13
71
问题
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of messages may have a different key than others.A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Each distinct pair of communicating parties must,ideally,share a different key,and perhaps each ciphertext exchanged as well.The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret.The difficulty of securely establishing a secret ________between two communicating parties,when a secure channel doesn’t already exist between them,also presents a chicken—and—egg problem which is a considerable practical obstacle for cryptography users in the real world.
Whitfield Diffie and Martin Hellman,authors of the first paper on public—key cryptography.
In a groundbreaking 1 976 paper,Whitfield Diffie and Martin Hellman proposed the notion of public—key(also,more generally,called asymmetric key)cryptography in which two different but mathematically related keys are used——a public key and a private key.A public key system is so constructed that calculation of one key(the private key)is computationally infeasible ________ the other(the public key),even though they are necessarily related.Instead,both keys are generated secretly,as an interrelated pair.The historian David Kahn described public—key cryptography as “the most revolutionary new concept in the field since poly—alphabetic substitution emerged in the Renaissance”.
In public-key cryptosystems,the ________ key may be freely distributed,while its paired private key must remain secret.The public key is typically used for encryption,while the private or secret key is used for decryption.Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie—Hellman key exchange protocol.
In 1978,Ronald Rivest,Adi Shamir,and Len Adleman invented ________,another public—key system.
In 1997,it finally became publicly known that asymmetric key cryptography had been invented by James H.Ellis at GCHQ,a British intelligence organization,and that,in the early 1970s,both the Diffie—Hellman and RSA algorithms had been previously developed(by Malcolm J.Williamson and Clifford Cocks,respectively).
②
选项
A、plaintext
B、stream
C、ciphertext
D、key
答案
D
解析
转载请注明原文地址:https://kaotiyun.com/show/9F0D777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
若一元二次方程ax2+bx+c=0(a≠0)的一个根是另一个根的两倍,则a,b,c之间的关系为()。
去年全国居民消费物价指数(CPI)仅上涨1.8%,属于温和型上涨。然而,老百姓的切身感受却截然不同,觉得水电煤气、蔬菜粮油、上学看病、坐车买房,样样都在涨价,涨幅一点也不“温和”。下面哪一个选项无助于解释题干中统计数据与老百姓感受之间的差距?
张教授:强迫一个人帮助另一个人是不道德的。因此,一个政府没有权力通过税收来进行利益和资源的再分配。任何人,如果愿意,完全可以自愿地帮助别人。李研究员:政府有权力这么做,只要这个政府允许人民自由地选择居留还是离开它所管理的国家。对以下哪个问题,张
长途汽车从A站出发,匀速行驶,1小时后突然发生故障,车速降低了40%,到B站终点延误达3小时,若汽车再多跑50公里后才发生故障,坚持行驶到B站能少延误1小时20分钟,那么A,B两地相距()公里。
一公司向银行借款34万元,欲按的比例分配给甲、乙、丙三车间进行技术改造,则甲车间应得()元。
从100人中调查对A、B两种2008年北京奥运会吉祥物的设计方案的意见,结果选A方案的人数是全体接受调查人数的3/5;选B方案的比选A方案的多6人,对两个方案都不喜欢的人数比对两个方案都喜欢的人数的1/3多2人,则两个方案都不喜欢的人数是()。
6张同排连号的电影票,分给3名教师与3名学生,若要求师生相间而坐,则不同的坐法有()。
封建社会的经济以自然经济为主要形式,自然经济是一种以自给自足为特征的经济形式,自然经济以分散的、自给自足的家庭生产为基础,生产规模狭小,社会分工低下。封建社会农民生产的劳动产品与商品最大的区别在于()
2021年10月12日,中共中央办公厅、国务院办公厅印发了《关于推动现代职业教育高质量发展的意见》(简称《意见》)。《意见》指出,职业教育是国民教育体系和人力资源开发的重要组成部分,肩负着培养多样化人才、传承技术技能、促进就业创业的重要职责。在全面建设社会
结合材料回答问题:材料1新中国成立后,中国在平等互利、相互尊重主权和领土完整的基础上同一批又一批国家建立了外交关系。然而,由于美方对中华人民共和国采取拒绝承认的错误政策,致使中美陷入长期相互隔绝、彼此敌对状态。历史总是要前进.时代总是要
随机试题
共和制国家分为________、________。
女性,40岁,主诉心悸、气短4个月,不能平卧2周。查体:心界无扩大,心率120次/分,律齐,腹水征阳性,肝肋下4cm,脾未及,下肢水肿,颈静脉怒张,奇脉征阳性。腹腔积液检查为漏出液。最可能的诊断是
用靛酚蓝比色法测定空气氨时,常见的Ca2+、Mg2+、Fe3+、Mn2+等多种离子对测定有干扰,加入后可以消除这种干扰的试剂为
患者,男,42岁,因足底被刺伤后出现全身肌肉强直性收缩,伴阵发性痉挛,诊断为破伤风。对于该患者进行伤口清创时最好选择
关于村民委员会的组织,下列哪些选项是不正确的?()
杨某曾在多个金矿从事风钻作业十多年,最近被诊断患有尘肺病。杨某拟向原工作过的单位索赔,但发现这些单位都已不存在,依据《职业病防治法》的规定,杨某可以向()申请医疗救助和生活等方面救助。
DNA-polⅠ具有的酶活性有
甲将面粉制作的假冒的消炎药卖至某药店后,获利巨大,对甲的行为()(2016年一专一第13题)
[*]
A、Theyshouldtakethetraininstead.B、TheyhavetodrivetoShanghaiforeconomicreason.C、They’dbetterdriverfaster.D、The
最新回复
(
0
)