首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
admin
2023-02-13
64
问题
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of messages may have a different key than others.A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Each distinct pair of communicating parties must,ideally,share a different key,and perhaps each ciphertext exchanged as well.The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret.The difficulty of securely establishing a secret ________between two communicating parties,when a secure channel doesn’t already exist between them,also presents a chicken—and—egg problem which is a considerable practical obstacle for cryptography users in the real world.
Whitfield Diffie and Martin Hellman,authors of the first paper on public—key cryptography.
In a groundbreaking 1 976 paper,Whitfield Diffie and Martin Hellman proposed the notion of public—key(also,more generally,called asymmetric key)cryptography in which two different but mathematically related keys are used——a public key and a private key.A public key system is so constructed that calculation of one key(the private key)is computationally infeasible ________ the other(the public key),even though they are necessarily related.Instead,both keys are generated secretly,as an interrelated pair.The historian David Kahn described public—key cryptography as “the most revolutionary new concept in the field since poly—alphabetic substitution emerged in the Renaissance”.
In public-key cryptosystems,the ________ key may be freely distributed,while its paired private key must remain secret.The public key is typically used for encryption,while the private or secret key is used for decryption.Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie—Hellman key exchange protocol.
In 1978,Ronald Rivest,Adi Shamir,and Len Adleman invented ________,another public—key system.
In 1997,it finally became publicly known that asymmetric key cryptography had been invented by James H.Ellis at GCHQ,a British intelligence organization,and that,in the early 1970s,both the Diffie—Hellman and RSA algorithms had been previously developed(by Malcolm J.Williamson and Clifford Cocks,respectively).
①
选项
A、different
B、same
C、public
D、private
答案
B
解析
转载请注明原文地址:https://jikaoti.com/ti/8moiFFFM
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
像“××集团举行周年庆典,您的手机号码被抽中获得了10万元大奖”这类并不高明的手机诈骗短信,即使经媒体曝光后仍然一再出现。职业骗子宁肯使用低劣的诈骗短信,也不去设计一些更具欺骗性、更易让人上当的短信,只能说明骗子太笨、太不敬业了。以下陈述如果为真,则
宝宝、贝贝、聪聪每人有两个外号,每两个人的外号都不相同。人们有时以数学博士、短跑健将、跳高冠军、小画家、大作家和歌唱家称呼他们,此外:①数学博士夸跳高冠军跳得高。②跳高冠军和大作家常与宝宝一起看电影。③短跑健将请小画家画贺年卡。④数
如图5-3所示,一个内直径是8cm的瓶子里,水的高度为7cm.把瓶盖拧紧倒置放平,无水部分是圆柱体,高度是18cm,则这个瓶子的容积是()cm3。
某工厂每日需要消耗甲材料5吨,每吨价格1000元,仓库储存1吨甲材料每日花费4元,购进甲材料每次需要花费运输费用1000元,若要每天有关甲材料的花费最少,则应该每()天购入一次。
一家人准备一起去北欧旅游,各自表达如下愿望:父亲:若去挪威,则不去丹麦和冰岛。母亲:若不去冰岛,则去挪威和丹麦。儿子:若不去挪威,则去瑞典和芬兰。最终的方案满足了上述每个人的愿望。根据以上陈述,可以得出下列哪项?
一公司向银行借款34万元,欲按的比例分配给甲、乙、丙三车间进行技术改造,则甲车间应得()元。
某种产品有4只次品和6只正品,每只产品均不相同且可区分,每次取出一只测试,直到4只次品全部测出为止,则最后一只次品恰好在第五次测试时被发现的不同情况有()。
简述中国特色社会主义法律体系的构成及其作用。
党的十九大报告指出,树立________是核心战斗力的思想,推进重大技术创新、自主创新,加强军事人才培养体系建设,建设创新型人民军队。()
设(X,Y)服从二维正态分布,则下列说法不正确的是().
随机试题
A.推动作用B.固摄作用C.气化作用D.防御作用E.温煦作用气的主要生理功能:物质转化和能量转化的过程的是
A.头之两侧连及耳部B.后脑下连及项C.前额部及眉棱处D.巅顶或连于目E.以上都不是
未分配利润将转入下期分配。()
有甲、乙、丙三个工作组,已知乙组两天的工作量和甲、丙共同工作一天的工作量相同,丙组一天的工作量和甲、乙两组共同工作一天的工作量相同,现有X工程先由甲、乙两组工作3天,再由丙组工作一天才能完成,那么X工程由甲组单独工作需要()天完成。
摄影:绘画
2018年国家统计局组织开展了第二次全国时间利用的随机抽样调查,共调查48580人。结果显示,受访居民在一天的活动中,有酬劳动平均用时4小时24分钟。其中,男性5小时15分钟,女生3小时35分钟;城镇居民3小时59分钟,农村居民5小时1分钟;工作日4小时5
已知函数f(x)在[0,1]上连续,在(0,1)内可导,且f(0)=0,f(1)=1。证明:存在两个不同的点η,ζ∈(0,1),使得f'(η)f'(ζ)=1。
下列英文缩写和中文名字的对照中,错误的是()。
Themajorityofnursesarewomen,butinthehigherranksofthemedicalprofessionwomenareina_____.
Intheearly1950stheresearcherswhoproducedthefirstcladglassopticalfiberswerenotthinkingofusingthemforcommunic
最新回复
(
0
)