首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
admin
2023-02-13
82
问题
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of messages may have a different key than others.A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Each distinct pair of communicating parties must,ideally,share a different key,and perhaps each ciphertext exchanged as well.The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret.The difficulty of securely establishing a secret ________between two communicating parties,when a secure channel doesn’t already exist between them,also presents a chicken—and—egg problem which is a considerable practical obstacle for cryptography users in the real world.
Whitfield Diffie and Martin Hellman,authors of the first paper on public—key cryptography.
In a groundbreaking 1 976 paper,Whitfield Diffie and Martin Hellman proposed the notion of public—key(also,more generally,called asymmetric key)cryptography in which two different but mathematically related keys are used——a public key and a private key.A public key system is so constructed that calculation of one key(the private key)is computationally infeasible ________ the other(the public key),even though they are necessarily related.Instead,both keys are generated secretly,as an interrelated pair.The historian David Kahn described public—key cryptography as “the most revolutionary new concept in the field since poly—alphabetic substitution emerged in the Renaissance”.
In public-key cryptosystems,the ________ key may be freely distributed,while its paired private key must remain secret.The public key is typically used for encryption,while the private or secret key is used for decryption.Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie—Hellman key exchange protocol.
In 1978,Ronald Rivest,Adi Shamir,and Len Adleman invented ________,another public—key system.
In 1997,it finally became publicly known that asymmetric key cryptography had been invented by James H.Ellis at GCHQ,a British intelligence organization,and that,in the early 1970s,both the Diffie—Hellman and RSA algorithms had been previously developed(by Malcolm J.Williamson and Clifford Cocks,respectively).
③
选项
A、from
B、in
C、to
D、of
答案
A
解析
转载请注明原文地址:https://kaotiyun.com/show/nF0D777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
某发电厂规定,居民月用电量低于100度的部分,按照0.5元/度收取;超过100度不足300度的部分,按照0.6元/度收取;超过300度的部分,按照0.7元/度收取,小王家这个月共交电费191元,则本月共用电()度。
人们普遍认为,保持乐观心态会促进健康。但一项对7万名50岁左右的女性进行的长达十年的追踪研究发现,长期保持乐观心态的被试者与心态悲观的被试者在死亡率上并没有差异。研究者据此认为,心态乐观与否与健康没有关系。以下哪项如果为真,则最能质疑研究者的结论?
某种产品去年的利润率为21%,今年由于原料涨价,成本增加了10%,如果今年的定价不变,则今年的利润率为()。
《张邱建算经》中有“百钱买百鸡”问题,即:鸡翁一,值钱五;鸡母一,值钱三;鸡雏三,值钱一;百钱买百鸡,问鸡翁、母、雏各几何?意思是说:公鸡每只5元,母鸡每只3元,雏鸡1元买3只,问花了100元买了100只鸡,则公鸡、母鸡、雏鸡各几只?那么满足题干条件的购买
最近的一次跨文化研究表明,一般结婚的人比离婚而没有再婚的人的寿命长。这一事实说明离婚的压力对健康有不利影响。以下哪项如果为真,则指出了上述观点的错误?
某市要建花园或修池塘,已知:修了池塘就要架桥,架了桥就不能建花园,建花园必须植树,植树必须架桥。若以上信息为真,则以下哪项不可能为真?
2021年10月12日,中共中央办公厅、国务院办公厅印发了《关于推动现代职业教育高质量发展的意见》(简称《意见》)。《意见》指出,职业教育是国民教育体系和人力资源开发的重要组成部分,肩负着培养多样化人才、传承技术技能、促进就业创业的重要职责。在全面建设社会
20世纪80年代末90年代初,随着冷战的结束和以信息技术为代表的新科技革命的推动,长期以来美苏对抗带来的世界经济体系的分割被打破,技术、资本、商品等真正实现了全球范围的流动,各国之间的经济联系日益密切,相互合作、相互依存大大加强,世界进入经济全球化时代。在
下列说法正确的是().
Here’sacommonscenariothatanynumberofentrepreneursfacetoday:you’retheCEOofasmallbusinessandthoughyou’remakin
随机试题
从所给的四个选项中,选择最合适的一个填入问号处,使之呈现一定的规律性。
该患者首选的治疗方法是:该患者手术治疗时,术式应选择:
嗌干、心痛,渴而欲饮,脯臂内后廉痛厥,多见于腰痛不可以俯仰,胸满,呃逆,多见于
对于任何一个建设项目,其管理的目标不包括()。
在喷漆车间安装通风系统,这种措施符合的安全技术措施基本原则是()。
下列各项设定受益计划产生的职工薪酬成本中,重新计量设定受益计划净负债或净资产所产生的变动的有()。
二战爆发前,德、意、日法西斯国家进行勾结的主要前提是()。
下面是关于基于ARM内核的嵌入式芯片中的存储器及高带宽外部存储器控制接口的叙述,其中错误的是()。
江老师使用Word编写完成了课程教案,需根据该教案创建PowerPoint课件,最优的操作方法是:
下列软件中,属于应用软件的是___________。
最新回复
(
0
)