首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
admin
2023-02-13
59
问题
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of messages may have a different key than others.A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Each distinct pair of communicating parties must,ideally,share a different key,and perhaps each ciphertext exchanged as well.The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret.The difficulty of securely establishing a secret ________between two communicating parties,when a secure channel doesn’t already exist between them,also presents a chicken—and—egg problem which is a considerable practical obstacle for cryptography users in the real world.
Whitfield Diffie and Martin Hellman,authors of the first paper on public—key cryptography.
In a groundbreaking 1 976 paper,Whitfield Diffie and Martin Hellman proposed the notion of public—key(also,more generally,called asymmetric key)cryptography in which two different but mathematically related keys are used——a public key and a private key.A public key system is so constructed that calculation of one key(the private key)is computationally infeasible ________ the other(the public key),even though they are necessarily related.Instead,both keys are generated secretly,as an interrelated pair.The historian David Kahn described public—key cryptography as “the most revolutionary new concept in the field since poly—alphabetic substitution emerged in the Renaissance”.
In public-key cryptosystems,the ________ key may be freely distributed,while its paired private key must remain secret.The public key is typically used for encryption,while the private or secret key is used for decryption.Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie—Hellman key exchange protocol.
In 1978,Ronald Rivest,Adi Shamir,and Len Adleman invented ________,another public—key system.
In 1997,it finally became publicly known that asymmetric key cryptography had been invented by James H.Ellis at GCHQ,a British intelligence organization,and that,in the early 1970s,both the Diffie—Hellman and RSA algorithms had been previously developed(by Malcolm J.Williamson and Clifford Cocks,respectively).
③
选项
A、from
B、in
C、to
D、of
答案
A
解析
转载请注明原文地址:https://kaotiyun.com/show/nF0D777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
刑警队需要充实缉毒组的力量,关于队中有哪些人来参加该组,已商定有以下意见:(1)如果甲参加,则乙也参加。(2)如果丙不参加,则丁参加。(3)如果甲不参加而丙参加,则队长戊参加。(4)队长戊和副队长己不能都参加。
如图18—1所示,有8个半径为1厘米的小圆,用他们的圆周的一部分连成一个花瓣图形(阴影部分),图中黑点是这些圆的圆心,则花瓣图形的面积为()平方厘米。
小明从家骑车去甲地,全程以速度v匀速行进,若骑行1小时后,速度变为原来的4/5,则会晚半小时到达目的地;若距离目的地还有10千米时将速度降为原来的4/5,则会晚10分钟到达目的地。小明家距离甲地()千米。
有A、B、C三组评委投票决定是否通过一个提案。A组评委共两人,B组评委共两人,C组评委共三人。每个评委都不能弃权,并且同意、反对必选其一,关于他们投票的信息如下:(1)如果A组两个评委的投票结果相同,并且至少有一个C组评委的投票结果也与A组所有评
地球两极地区所有的冰都是由降雪形成的。特别冷的空气不能保持很多的湿气,所以不能产生大量降雪。近年来,两极地区的空气无一例外地特别冷。以上信息能最有力地支持以下哪一项结论?
王先生要在自己家装修一个矩形水池(无盖),要求这个水池1米高,容积为4立方米,已知底面的装修价格为每平方米180元,侧面装修价格为每平方米90元,则该水池最低的装修成本为()元。
一组数据1,2,3,3,5,6,2,5,6,4,5,2,3的众数为()。
1848年,席卷欧洲的资产阶级民主革命爆发,马克思积极投入并指导这场革命斗争。革命失败后,马克思深刻总结革命教训,力求通过系统研究政治经济学,揭示资本主义的本质和规律。之后,由马克思所撰写的最厚重、最丰富的著作,也被誉为“工人阶级的圣经”的著作是(
结合材料回答问题:回顾深圳经济特区40年的跨越发展,“开放”是一个至关重要的视角。不久前,深圳发布了一组亮眼的外贸数据:今年1—8月,深圳进出口总值达到1,88万亿元,同比增长2%;仅今年上半年,全市设立了外商投资企业近2000家,吸收合同外资近80亿美
阅读下列案例内容,回答并计算问题1至问题4,将解答填入答题纸的对应栏内。【说明】A公司新接到一个IDC运营商B的服务需求,服务对象包括数十台的网络设备和存储设备,以及一个机房的空调和柴发装置。但A公司的服务能力主要在IT设备领域,基础设施服务没有积累。
随机试题
用电位滴定法确定KMnO4标准滴定溶液滴定Fe2+的终点,以铂电极为指示电极,以饱和甘汞电极为参比电极。()
设f(x)在x=x0处可导,则f’(x0)=().
不符合急性水肿性胰腺炎的描述是
精神药品毒性药品原料药
A公司与B公司签订了购销合同,由A公司向B公司提供价值300000元的钢材,B公司向A公司提供价值400000元的水泥,货物价差由A公司付款补足。已知购销合同的印花税税率为0.3‰,A、B两公司共应缴纳印花税为()元。
极限
在一项黑猩猩取食香蕉的研究中,笼内放置一根短棍,笼外放置一根长棍和香蕉。在尝试使用短棍够取香蕉未果后,黑猩猩在笼内走来走去,经过一段时间,它突然用短棍将长棍拨到身边,并用长棍获取了笼外的香蕉。黑猩猩解决这个问题的过程是
在简单商品经济中存在的矛盾有( )
Pigshavealwayshadabadpress.Suchexpressionsas"piggishness","pig-headed","buypig-in-a-poke","hog-wash","hog-wild",
Speedingoffinastolencar,thethiefthinkshehasgotagreatcatch.Butheisinforanunwelcomesurprise.Thecarisfitt
最新回复
(
0
)