首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
admin
2023-02-13
62
问题
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of messages may have a different key than others.A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Each distinct pair of communicating parties must,ideally,share a different key,and perhaps each ciphertext exchanged as well.The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret.The difficulty of securely establishing a secret ________between two communicating parties,when a secure channel doesn’t already exist between them,also presents a chicken—and—egg problem which is a considerable practical obstacle for cryptography users in the real world.
Whitfield Diffie and Martin Hellman,authors of the first paper on public—key cryptography.
In a groundbreaking 1 976 paper,Whitfield Diffie and Martin Hellman proposed the notion of public—key(also,more generally,called asymmetric key)cryptography in which two different but mathematically related keys are used——a public key and a private key.A public key system is so constructed that calculation of one key(the private key)is computationally infeasible ________ the other(the public key),even though they are necessarily related.Instead,both keys are generated secretly,as an interrelated pair.The historian David Kahn described public—key cryptography as “the most revolutionary new concept in the field since poly—alphabetic substitution emerged in the Renaissance”.
In public-key cryptosystems,the ________ key may be freely distributed,while its paired private key must remain secret.The public key is typically used for encryption,while the private or secret key is used for decryption.Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie—Hellman key exchange protocol.
In 1978,Ronald Rivest,Adi Shamir,and Len Adleman invented ________,another public—key system.
In 1997,it finally became publicly known that asymmetric key cryptography had been invented by James H.Ellis at GCHQ,a British intelligence organization,and that,in the early 1970s,both the Diffie—Hellman and RSA algorithms had been previously developed(by Malcolm J.Williamson and Clifford Cocks,respectively).
③
选项
A、from
B、in
C、to
D、of
答案
A
解析
转载请注明原文地址:https://kaotiyun.com/show/nF0D777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
1988年北美的干旱可能是由太平洋赤道附近温度的大范围改变引起的。因此,这场干旱不能证明就长期而言全球发生变暖趋势的假说。该假说声称,全球变暖趋势是由像二氧化碳这样的大气污染物造成的。下面哪项如果正确,则能构成对以上论述最好的批判?
地球两极地区所有的冰都是由降雪形成的。特别冷的空气不能保持很多的湿气,所以不能产生大量降雪。近年来,两极地区的空气无一例外地特别冷。以上信息能最有力地支持以下哪一项结论?
从6人中选出4人分别到巴黎、伦敦、悉尼、莫斯科四个城市游览,要求每个城市有一人游览,每人只游览一个城市,且这6人中甲、乙两人不去巴黎游览,则不同的选择方案共有()。
马克思主义哲学认为,实践是人的有目的的活动,这种“有目的的活动不仅是指向自己,而且是为了通过消灭外部世界的规定(方面、特征、现象)来获得具有外部现实形式的实在性”。换言之,人在实践活动中并非仅受自然界及规律的制约,还要依据自己的目的利用客观规律去改变自然界
结合材料回答问题:材料1“七一勋章”颁授仪式举行时,72岁的黄忠杰在广西壮族自治区百色市田阳区(原田阳县)田州镇的家中守在电视机前。当会场广播念到女儿黄文秀的名字时,黄忠杰和妻子黄彩勤热泪盈眶。“这是党中央对黄文秀工作的高度评价和认可,我们感到
党的十九大报告指出,树立________是核心战斗力的思想,推进重大技术创新、自主创新,加强军事人才培养体系建设,建设创新型人民军队。()
1949年3月,在中国人民革命即将取得全国胜利的前夕,中国共产党在河北省平山县西柏坡村召开了中共七届二中全会。下列关于七届二中全会的表述,正确的是()
中国古代的思想家大都认为,在塑造理想人格的过程中,最重要的就是要奋发向上、切磋践履、修身养性。一个社会的道德规范和道德原则确立之后,最重要的就是要使这些道德原则和道德规范能够转化成人们的思想品德和行为实践,养成良好的道德习惯,形成完善的道德人格。儒家经典《
设薄片占的区域D如下,求均匀薄片的质心:D是由心脏线r=1+cosθ所围成;
阅读下列案例内容,回答并计算问题1至问题4,将解答填入答题纸的对应栏内。【说明】A公司新接到一个IDC运营商B的服务需求,服务对象包括数十台的网络设备和存储设备,以及一个机房的空调和柴发装置。但A公司的服务能力主要在IT设备领域,基础设施服务没有积累。
随机试题
甲、乙、丙、丁共有一辆货车,甲占该车70%的份额,乙、丙、丁各占10%的份额。现甲欲将该车作抵押向某银行贷款10万元。如果各共有人事先对此未作约定,则下列说法中正确的是()。
简述接入控制的功能。
组织间沟通
中华田园犬,雄性,3岁,15kg,免疫史不详,5日前外出时左侧股部被刺伤,患犬牙关紧闭,吞咽困难,流涎,头颈伸直,背腰僵硬,四肢强直,状如木马。创伤部位分离出革兰阳性厌氧梭菌。患犬的综合治疗措施不包括
取头顶、项部以及上背部的腧穴,患者应取的体位为
下列经济行为中,不符合印花税政策规定的是()。
研究表明,快、慢肌特征的区分方法不正确的是()。
Ifyouknowexactlywhatyouwant,thebestroutetoajobistogetspecializedtraining.Arecentsurveyshowsthatcompanies
设向量组α1,α2,α3线性无关,β1可由α1,α2,α3线性表示,而向量β2不能由α1,α2,α3线性表示,则对于任意常数k,必有().
A、Thirstyplants.B、Well-wateredplants.C、Quietplants.D、Healthyplants.A
最新回复
(
0
)