首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
admin
2023-02-13
96
问题
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of messages may have a different key than others.A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Each distinct pair of communicating parties must,ideally,share a different key,and perhaps each ciphertext exchanged as well.The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret.The difficulty of securely establishing a secret ________between two communicating parties,when a secure channel doesn’t already exist between them,also presents a chicken—and—egg problem which is a considerable practical obstacle for cryptography users in the real world.
Whitfield Diffie and Martin Hellman,authors of the first paper on public—key cryptography.
In a groundbreaking 1 976 paper,Whitfield Diffie and Martin Hellman proposed the notion of public—key(also,more generally,called asymmetric key)cryptography in which two different but mathematically related keys are used——a public key and a private key.A public key system is so constructed that calculation of one key(the private key)is computationally infeasible ________ the other(the public key),even though they are necessarily related.Instead,both keys are generated secretly,as an interrelated pair.The historian David Kahn described public—key cryptography as “the most revolutionary new concept in the field since poly—alphabetic substitution emerged in the Renaissance”.
In public-key cryptosystems,the ________ key may be freely distributed,while its paired private key must remain secret.The public key is typically used for encryption,while the private or secret key is used for decryption.Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie—Hellman key exchange protocol.
In 1978,Ronald Rivest,Adi Shamir,and Len Adleman invented ________,another public—key system.
In 1997,it finally became publicly known that asymmetric key cryptography had been invented by James H.Ellis at GCHQ,a British intelligence organization,and that,in the early 1970s,both the Diffie—Hellman and RSA algorithms had been previously developed(by Malcolm J.Williamson and Clifford Cocks,respectively).
③
选项
A、from
B、in
C、to
D、of
答案
A
解析
转载请注明原文地址:https://kaotiyun.com/show/nF0D777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
有一位研究者称,在数学方面女性和男性一样有才能。但是她们的才能之所以未被充分发挥出来,是因为社会期望她们在其他更多的方面表现出自己的能力。以下哪项是该研究者的一个假设?
论证有效性分析:分析下述论证中存在的缺陷和漏洞,选择若干要点,写一篇600字左右的文章,对该论证的有效性进行分析和评论。(论证有效性分析的一般要点是:概念特别是核心概念的界定和使用是否准确并前后一致,有无各种明显的逻辑错误,论证的论据是否成立并支持结论,结
一个人到底是做出好的行为还是做出坏的行为,跟他生命的长短有关。如果他只活一天的话,他去偷人家东西是最好的,因为他不会遭受担心被抓住的痛苦。对于还能活20年的人来说,偷人家东西就不是最好的,因为他会遭受担心被抓住的痛苦。如果以下各项陈述为真,除哪项之外,
甲跑11米所用的时间,乙只能跑9米,在400米标准田径场上,两人同时出发依同一方向,以上速度匀速跑离起点A,当甲第三次追上乙时,乙离起点还有()米。
受苏联的影响,我国一度过多强调重工业和基础设施的发展,影响了农业和轻工业的发展,造成了一定程度的比例失调。1957年,在《关于正确处理人民内部矛盾的问题》一文中,毛泽东明确提出要走一条有别于苏联的中国工业化道路。走中国工业化道路()
马克思在《资本论》中指出:“资本来到世问,从头到脚,每个毛孔都滴着血和肮脏的东西。”因此,扩大再生产过程中的追加资本,一开始就没有一个价值原子不是由别人的无酬劳动产生的。这表明()
如何把握我国社会主要矛盾的变化?
中国封建社会的文化思想体系的核心是________。
Here’sacommonscenariothatanynumberofentrepreneursfacetoday:you’retheCEOofasmallbusinessandthoughyou’remakin
Here’sacommonscenariothatanynumberofentrepreneursfacetoday:you’retheCEOofasmallbusinessandthoughyou’remakin
随机试题
锄某企业在制定产品价格时,参照主要竞争者的价格来定价,这种竞争导向定价法属于()
A.3’→5’外切酶活性B.5’→3’外切酶活性C.两者皆有D.两者皆无大肠杆菌DNA聚合酶Ⅲ具有
肠道血吸虫病,一般不发生
10岁男孩,因发热,关节肿痛,皮肤出现环行红斑,心率快出现奔马律,血沉增快,经治疗上述症状、体征消失后。需继发性预防的方法是
硝酸甘油对血管的作用中,描述不正确的是
服药期间不宜同时服用藜芦、五灵脂、皂荚及其制剂,不宜喝茶和吃萝卜的是
A.滴丸B.泡腾片剂C.咀嚼片D.膜剂E.缓控释制剂多用于病情急重者的是()
利达水泥制品厂为某建筑工程公司承包一项生产预制件任务,按合同的约定,应在5月交货,但到10月也未交货。此建筑工程公司因此停工待料,损失了5万元。而合同中约定的违约金仅5000元。对于这一情况,此建筑工程公司可以要求利达水泥制品厂承担怎样的民事责任
NATO
在函数中,定义一个变量时,默认的存储类型是
最新回复
(
0
)