首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
admin
2023-02-13
74
问题
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of messages may have a different key than others.A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Each distinct pair of communicating parties must,ideally,share a different key,and perhaps each ciphertext exchanged as well.The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret.The difficulty of securely establishing a secret ________between two communicating parties,when a secure channel doesn’t already exist between them,also presents a chicken—and—egg problem which is a considerable practical obstacle for cryptography users in the real world.
Whitfield Diffie and Martin Hellman,authors of the first paper on public—key cryptography.
In a groundbreaking 1 976 paper,Whitfield Diffie and Martin Hellman proposed the notion of public—key(also,more generally,called asymmetric key)cryptography in which two different but mathematically related keys are used——a public key and a private key.A public key system is so constructed that calculation of one key(the private key)is computationally infeasible ________ the other(the public key),even though they are necessarily related.Instead,both keys are generated secretly,as an interrelated pair.The historian David Kahn described public—key cryptography as “the most revolutionary new concept in the field since poly—alphabetic substitution emerged in the Renaissance”.
In public-key cryptosystems,the ________ key may be freely distributed,while its paired private key must remain secret.The public key is typically used for encryption,while the private or secret key is used for decryption.Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie—Hellman key exchange protocol.
In 1978,Ronald Rivest,Adi Shamir,and Len Adleman invented ________,another public—key system.
In 1997,it finally became publicly known that asymmetric key cryptography had been invented by James H.Ellis at GCHQ,a British intelligence organization,and that,in the early 1970s,both the Diffie—Hellman and RSA algorithms had been previously developed(by Malcolm J.Williamson and Clifford Cocks,respectively).
②
选项
A、plaintext
B、stream
C、ciphertext
D、key
答案
D
解析
转载请注明原文地址:https://kaotiyun.com/show/9F0D777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
某俱乐部大厅门口贴着一张通知:欢迎加入俱乐部!只要你愿意,并且通过推理取得一张申请表,就可以获得会员资格了!走进大厅看到左右各有一个箱子,左边的箱子上写着一句话:“申请表不在此箱中。”右边的箱子上也写着一句话:“这两句话中只有一句话是真的。”假设介入
已知(x2+px+8)(x2-3x+q)的展开式中不含x2,x3项,则p,q的值为()。
某校规定学生的学期体育成绩由三部分组成:体育课外活动占10%,理论测试占30%,体育技能测试占60%,一名同学的上述成绩依次为90,92,73,则该同学这学期的体育成绩为()。
某商场销售一批名牌衬衫,平均每天可以出售20件,每件盈利40元,为扩大销售,尽快减少库存,商场决定适当采取降价措施,经调查发现,商场每降价l元,平均每天可以多出售两件,为使商场平均每天盈利最多,应降价()元。
某人射击一次击中的概率是0.6,经过3次射击,此人至少有两次击中目标的概率为()。
从5位男教师和4位女教师中选出3位教师,派到3个班担任班主任(每班1位班主任),要求这3位班主任中男、女教师都要有,则不同的选派方案共有()。
世界上没有放之四海而皆准的发展道路和发展模式,也没有一成不变的发展道路和发展模式。30年前,印有五角星和镰刀锤头的红旗在克里姆林宫上空悄然滑落,社会主义阵营“老大哥”消失,西亚北非地区陷入动荡。如今,中国共产党已然走过100年春秋,中国特色社会主义比任何时
2021年1月,中共中央办公厅、国务院办公厅印发了《建设高标准市场体系行动方案》,这是继2020年推出《关于构建更加完善的要素市场化配置体制机制的意见》《关于新时代加快完善社会主义市场经济体制的意见》后,党中央、国务院持续推进市场化改革的又一重要部署,将对
2020年1月15日,中共中央政治局委员、国务院副总理、中美全面经济对话中方牵头人刘鹤与美国总统特朗普在白宫正式签署中美第一阶段经贸协议。对中美第一阶段经贸协议的认识正确的有()
设薄片占的区域D如下,求均匀薄片的质心:D是介于两个圆r=cosθ和r=2cosθ之间的闭区域.
随机试题
男性,59岁,乏力、低热、伴夜间盗汗1个月,X线胸片示左上肺(上叶尖后段)浸润型肺结核,抗结核药物治疗的最佳方案是
A.交界性肿瘤B.早期癌C.良性肿瘤D.恶性肿瘤E.癌前病变直、结肠家族性多发性腺瘤性息肉属于()。
混凝土桥梁构件钢筋混凝土保护层厚度特征值与设计值的比值≤0.55时,对应的评定标度为()。
就城市规划管理而言,控制,是指规划管理人员对城市规划的编制、()和各项建设活动是否符合城市规划要求及其法律规范进行制约、引导,并促使其达到管理目标,实现管理任务的过程。
关于股票股利,下列说法正确的是()。
股票分割的主要作用不包括()。
为由人民法院依法判处有期徒刑、无期徒刑且未满18周岁的罪犯执行刑罚的专门机构是()。
(单选题)著名言论“天变不足畏,祖宗不足法,人言不足恤”出自(),这句话不仅简明扼要地说出了其变法的决心,而且表现出他变法的巨大勇气,成为许多改革者自我激励的豪言壮语。
将考生文件夹下DOSION文件夹中的文件HDLS.SEL复制到同一文件夹中,文件命名为AEUT.SEL。
StevenWeinbergisthatkindofpersonwhonotonlywouldliketohelpothers,butreallyenjoyingdoingso.Thatis【C1】______h
最新回复
(
0
)