首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
admin
2023-02-13
54
问题
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of messages may have a different key than others.A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Each distinct pair of communicating parties must,ideally,share a different key,and perhaps each ciphertext exchanged as well.The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret.The difficulty of securely establishing a secret ________between two communicating parties,when a secure channel doesn’t already exist between them,also presents a chicken—and—egg problem which is a considerable practical obstacle for cryptography users in the real world.
Whitfield Diffie and Martin Hellman,authors of the first paper on public—key cryptography.
In a groundbreaking 1 976 paper,Whitfield Diffie and Martin Hellman proposed the notion of public—key(also,more generally,called asymmetric key)cryptography in which two different but mathematically related keys are used——a public key and a private key.A public key system is so constructed that calculation of one key(the private key)is computationally infeasible ________ the other(the public key),even though they are necessarily related.Instead,both keys are generated secretly,as an interrelated pair.The historian David Kahn described public—key cryptography as “the most revolutionary new concept in the field since poly—alphabetic substitution emerged in the Renaissance”.
In public-key cryptosystems,the ________ key may be freely distributed,while its paired private key must remain secret.The public key is typically used for encryption,while the private or secret key is used for decryption.Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie—Hellman key exchange protocol.
In 1978,Ronald Rivest,Adi Shamir,and Len Adleman invented ________,another public—key system.
In 1997,it finally became publicly known that asymmetric key cryptography had been invented by James H.Ellis at GCHQ,a British intelligence organization,and that,in the early 1970s,both the Diffie—Hellman and RSA algorithms had been previously developed(by Malcolm J.Williamson and Clifford Cocks,respectively).
③
选项
A、from
B、in
C、to
D、of
答案
A
解析
转载请注明原文地址:https://kaotiyun.com/show/nF0D777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
刑警队需要充实缉毒组的力量,关于队中有哪些人来参加该组,已商定有以下意见:(1)如果甲参加,则乙也参加。(2)如果丙不参加,则丁参加。(3)如果甲不参加而丙参加,则队长戊参加。(4)队长戊和副队长己不能都参加。
国庆长假,赵大、钱二、张珊、李思、王伍五位同事打算出国游玩,因为时间有限,每个人只能从泰国、新加坡、马来西亚、日本、韩国五个国家中选择两个国家游玩,并且每个国家也恰好有两个人选择。同时还需要满足以下奈件:(1)如果赵大去马来西亚,则张珊不去泰国。
一个盒子装有不多于200颗的糖,每次2颗,3颗,4颗或6颗地取出,最终盒内都只剩下一颗糖,如果每次以11颗地取出,那么正好取完,设盒子里共有m颗糖,则m的各数位上数字之和为()。
某校高一、高二、高三三个年级的学生人数比为7:8:10,若全校共有学生2500人,则高一有()人。
从集合{O,P,Q,R,S}与{0,1,2,3,4,5,6,7,8,9}中各任选2个元素排成一排(字母和数字均不能重复),其中字母O,Q和数字0至多只能出现一个的不同排法有()。
中国特色社会主义法律体系是以我国全部现行法律规范按照一定的标准和原则划分为不同的法律部门,并由这些法律部门所构成的具有内在联系的统一整体。每一法律部门均由一系列调整相同类型社会关系的众多法律、法规所构成。下列属于程序法律部门的是()
随着信息技术的发展,电子商务(E-business)、电子银行(E-banking)、电子政务(E-government)正在走进我们的生活。许多人购物和旅行时经常使用信用卡。信用卡作为电子货币的一种,在使用过程中执行的货币职能有()
Mostmalesintheanimalkingdomdolittleparenting.Sometimes,though,parentalinvestmentbyamalepaysoff.Songbirdchicks
________不属于典型的网络链路传输控制技术。
TCP可靠传输机制为了确定超时计时器的值,首先要估算RTT。估算RTT采用如下公式:估算RTTs=(1-α)×(估算RTTs)+α×(新的RTT样本),其中α的值常取为________。
随机试题
下述哪项不是大肠癌的特点
循行于肩部及肩胛部的经脉有
胎盘是由以下哪项组成
关于门静脉高压症的病因下列叙述有误的是()
A、引起嗜睡B、致使视物模糊C、致使定向力障碍D、引起多尿或多汗E、致使眩晕或腹痛驾驶员慎用哌替啶的原因是()。
对下列排水沟图例含义的表述,错误的是:[2009年第89题]
某医院门诊楼,位于市中心区域,建筑面积28326m2,地下1层,地上10层,檐高33.7m。框架一剪力墙结构,筏板基础,基础埋深7.8m,底板厚度1100mm,混凝土强度等级C30,抗渗等级P8。室内地面铺设实木地板,工程精装修交工。2008年3月15日开
下列项目属于借款费用的有()。
Theshopassistantwasdismissedasshewas______ofcheatingcustomers.
版面空间(北京印刷学院,2011;吉林大学,2011;天津师范大学,2015)
最新回复
(
0
)