首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
admin
2023-02-13
60
问题
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of messages may have a different key than others.A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Each distinct pair of communicating parties must,ideally,share a different key,and perhaps each ciphertext exchanged as well.The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret.The difficulty of securely establishing a secret ________between two communicating parties,when a secure channel doesn’t already exist between them,also presents a chicken—and—egg problem which is a considerable practical obstacle for cryptography users in the real world.
Whitfield Diffie and Martin Hellman,authors of the first paper on public—key cryptography.
In a groundbreaking 1 976 paper,Whitfield Diffie and Martin Hellman proposed the notion of public—key(also,more generally,called asymmetric key)cryptography in which two different but mathematically related keys are used——a public key and a private key.A public key system is so constructed that calculation of one key(the private key)is computationally infeasible ________ the other(the public key),even though they are necessarily related.Instead,both keys are generated secretly,as an interrelated pair.The historian David Kahn described public—key cryptography as “the most revolutionary new concept in the field since poly—alphabetic substitution emerged in the Renaissance”.
In public-key cryptosystems,the ________ key may be freely distributed,while its paired private key must remain secret.The public key is typically used for encryption,while the private or secret key is used for decryption.Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie—Hellman key exchange protocol.
In 1978,Ronald Rivest,Adi Shamir,and Len Adleman invented ________,another public—key system.
In 1997,it finally became publicly known that asymmetric key cryptography had been invented by James H.Ellis at GCHQ,a British intelligence organization,and that,in the early 1970s,both the Diffie—Hellman and RSA algorithms had been previously developed(by Malcolm J.Williamson and Clifford Cocks,respectively).
③
选项
A、from
B、in
C、to
D、of
答案
A
解析
转载请注明原文地址:https://jikaoti.com/ti/bmoiFFFM
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
如果危机发生时,公司能够采取非常有效的办法来消除危机,实际上能够增加公司的声誉。一个非常好的声誉,可能因为一个事件,转眼就被破坏;而一个不好的声誉,往往需要很长时间的努力才能消除它。如果以上陈述为真,则最能支持以下哪项陈述?
某企业最近开发出一种体积很小的洗碗机。该公司总经理向新闻界介绍该产品的时候说:“这种洗碗机有出口欧美市场的前景,因为西方国家的单身家庭越来越多,而这种体积小、价格低的洗碗机最适合于低收入家庭。”下列哪项陈述有利于反驳上述观点?Ⅰ.洗碗机在国内市
由于冷冻食品的过程消耗能量,因此很多人使他们的电冰箱保持半空状态,只用它们贮存购买的冷冻食品。但是半空的电冰箱经常比装满的电冰箱消耗的能量更多。下面哪项如果是正确的,则最能解释上面描述的明显的矛盾?
机场候机大厅里有三位乘客坐在椅子上聊天。坐在左边座位的乘客要去法国,中间座位的乘客要去德国,右边座位的乘客要去英国。要去法国的乘客说:“我们三人这次旅行的目的地恰好是我们三人的祖国,可我们每个人的目的地又不是自己的祖国。”德国人听了,无限感慨地回应说:“我
《张邱建算经》中有“百钱买百鸡”问题,即:鸡翁一,值钱五;鸡母一,值钱三;鸡雏三,值钱一;百钱买百鸡,问鸡翁、母、雏各几何?意思是说:公鸡每只5元,母鸡每只3元,雏鸡1元买3只,问花了100元买了100只鸡,则公鸡、母鸡、雏鸡各几只?那么满足题干条件的购买
某人制订了一项旅游计划,从7个旅游城市中选择5个进行游览.如果城市A、B必选,并且在旅游过程中必须按先A后B的次序经过A、B两城市(A、B两城市可以不相邻),则不同的游览路线有()。
我国科学家成功克隆了两只猕猴,很多人认为,这项技术的突破并不大,因为20多年前美国就已经诞生了克隆羊。但实际上,当初的克隆羊采用的是胚胎分裂技术,而中国科学家采用的则是更为先进的体细胞克隆技术。由此可见()
________是提升国民经济整体素质、赢得国际经济竞争主动权的根本途径,是加快转变经济发展方式的主攻方向。()
结合材料回答问题:人们在就餐时,许多病菌会通过唾液和筷子以及一些不注意的方式进行传播,其中,共餐是感染病菌的重要途径之一。倡导分餐制,使用公勺、公筷,是有效降低和减少疾病的重要的方法。在新冠病毒全球肆虐的当下,专家强烈建议,就餐应采用分餐制,使用公勺、公
下列有关民事责任的说法正确的是()
随机试题
Inmanycountriesthelawforbidscitizenstocarrypistolsorrifleswithoutfirst______aspecialpermit.
We’relate.Iexpectthefilm______bythetimewegettothecinema.
煮沸消毒法的应用,错误的是
A、血虚B、血寒C、阴亏D、脾虚E、津伤舌色淡白、舌体胖大有裂纹者主
下列各项中,不属于工程建设监理工作程序的是()。
建立账套时,如果选择“是否按行业预置科目”,则系统会自动建立企业所需的所有会计科目。 ( )
下列关于工作时间、休息休假的说法,正确的有()
以下程序运行后,输出结果为______。main(){inta[2][3]={1,3,5,7,9,11},*s[2],**pp,*p:s[0]=a[0],s[1]=a[1];pp=s;p=(int*)mal
若希望使用一个或多个字段的值进行计算,需要在查询设计视图的设计网格中添加【】字段。
DuringMcDonald’searlyyearsFrenchfriesweremadefromscratcheveryday.RussetBurbankpotatoeswere【1】,cutintoshoestrin
最新回复
(
0
)