首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
admin
2023-02-13
78
问题
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of messages may have a different key than others.A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Each distinct pair of communicating parties must,ideally,share a different key,and perhaps each ciphertext exchanged as well.The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret.The difficulty of securely establishing a secret ________between two communicating parties,when a secure channel doesn’t already exist between them,also presents a chicken—and—egg problem which is a considerable practical obstacle for cryptography users in the real world.
Whitfield Diffie and Martin Hellman,authors of the first paper on public—key cryptography.
In a groundbreaking 1 976 paper,Whitfield Diffie and Martin Hellman proposed the notion of public—key(also,more generally,called asymmetric key)cryptography in which two different but mathematically related keys are used——a public key and a private key.A public key system is so constructed that calculation of one key(the private key)is computationally infeasible ________ the other(the public key),even though they are necessarily related.Instead,both keys are generated secretly,as an interrelated pair.The historian David Kahn described public—key cryptography as “the most revolutionary new concept in the field since poly—alphabetic substitution emerged in the Renaissance”.
In public-key cryptosystems,the ________ key may be freely distributed,while its paired private key must remain secret.The public key is typically used for encryption,while the private or secret key is used for decryption.Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie—Hellman key exchange protocol.
In 1978,Ronald Rivest,Adi Shamir,and Len Adleman invented ________,another public—key system.
In 1997,it finally became publicly known that asymmetric key cryptography had been invented by James H.Ellis at GCHQ,a British intelligence organization,and that,in the early 1970s,both the Diffie—Hellman and RSA algorithms had been previously developed(by Malcolm J.Williamson and Clifford Cocks,respectively).
②
选项
A、plaintext
B、stream
C、ciphertext
D、key
答案
D
解析
转载请注明原文地址:https://kaotiyun.com/show/9F0D777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
美国食品和药物管理局(FDA)在市场中引入了新的治疗药剂。新治疗药剂在提高美国人的健康水平方面起了非常关键的作用。那些在学校、政府研究团体内的人的职责是从事长期的研究,以图发现新的治疗药剂,并对它们进行临床验证。而使实验室里的新发现比较容易地转移到市场上是
从4名男生3名女生中选择4人参加老吕暑假集训营,若这4个人中既有男生又有女生,则不同的选法有()种。
甲烧杯中有200g浓度为25%的酒精溶液,乙烧杯中有500g浓度为16%的酒精溶液,现在往两个烧杯中加入等量的水,使两个酒精溶液的浓度一样,则要加入()g水。
6人站成一排照相,其中甲,乙,丙三人要站在一起,且要求乙,丙分别站在甲的两边,则不同的排法种数有()。
用1、2、3、4、5、6、7、8组成没有重复数字的八位数,要求1和2相邻,3与4相邻,5与6相邻,而7与8不相邻,这样的八位数共有()。
已知等差数列{an}的公差不为0,但第三、四、七项构成等比数列,则(a2+a6)/(a3+a7)=()。
结合材料回答问题:深化改革,跑出创新“加速度”通过基因测序技术,用一根头发就能掌握生命信息,进行个性化的健康管理;借助人工智能,清洁机器人既能实现排水、加水、充电一体化操作,还能自主上下电梯、清扫不
结合材料回答问题:材料1346支国家医疗队、4万多名医务人员毅然奔赴前线,很多人在万家团圆的除夕之夜踏上征程。人民军队医务人员牢记我军宗旨,视疫情为命令,召之即来,来之能战,战之能胜。……人民是真正的英雄。回顾抗击新
如今,越来越多的购物通过网络完成,消费者根本见不到商家实体商店和商家长相,当今社会的公共生活领域,则更像一个“陌生人社会”。这体现了社会公共生活具有()
利用微分求近似值tan45°10’.
随机试题
强化理论的提出者是美国的心理学家和行为科学家()
以下炎症介质和细胞因子中可作为脓毒症预后指标的是
克隆病的病理改变最有意义的是
药物制剂的含量用()。
[2013年,第60题]图5.2-13示结构的两杆许用应力均为[σ],杆1面积为A,杆2面积为2A,则该结构的许用载荷是()。
在建筑物和岩石接触面之间进行的灌浆,以加强二者间的结合程度和基础的整体性,提高抗滑稳定的灌浆方法是()。
政府购买是决定国民收入大小的主要因素之一,下列项目中,属于政府转移支付的是()。
下列关于法的第一层次本质——国家意志的体现,理解不正确的是()。
对于被判处无期徒刑的犯罪分子,可以假释,但其实际执行的刑期应当为()。
在SQLServer2008中,master是一个非常重要的系统数据库,如果master损坏将会对系统造成严重后果,因此系统管理员应该对master进行备份。SQLServer2008对数据库提供的备份有:Ⅰ.完整备份Ⅱ.差异备份Ⅲ.日志备
最新回复
(
0
)