首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
admin
2023-02-13
44
问题
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of messages may have a different key than others.A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Each distinct pair of communicating parties must,ideally,share a different key,and perhaps each ciphertext exchanged as well.The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret.The difficulty of securely establishing a secret ________between two communicating parties,when a secure channel doesn’t already exist between them,also presents a chicken—and—egg problem which is a considerable practical obstacle for cryptography users in the real world.
Whitfield Diffie and Martin Hellman,authors of the first paper on public—key cryptography.
In a groundbreaking 1 976 paper,Whitfield Diffie and Martin Hellman proposed the notion of public—key(also,more generally,called asymmetric key)cryptography in which two different but mathematically related keys are used——a public key and a private key.A public key system is so constructed that calculation of one key(the private key)is computationally infeasible ________ the other(the public key),even though they are necessarily related.Instead,both keys are generated secretly,as an interrelated pair.The historian David Kahn described public—key cryptography as “the most revolutionary new concept in the field since poly—alphabetic substitution emerged in the Renaissance”.
In public-key cryptosystems,the ________ key may be freely distributed,while its paired private key must remain secret.The public key is typically used for encryption,while the private or secret key is used for decryption.Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie—Hellman key exchange protocol.
In 1978,Ronald Rivest,Adi Shamir,and Len Adleman invented ________,another public—key system.
In 1997,it finally became publicly known that asymmetric key cryptography had been invented by James H.Ellis at GCHQ,a British intelligence organization,and that,in the early 1970s,both the Diffie—Hellman and RSA algorithms had been previously developed(by Malcolm J.Williamson and Clifford Cocks,respectively).
②
选项
A、plaintext
B、stream
C、ciphertext
D、key
答案
D
解析
转载请注明原文地址:https://jikaoti.com/ti/HmoiFFFM
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
有两个自然数a、b,已知两数之和是31,两数之积是750的约数,则|a-b|=()。
大学生利用假期当保姆已不再是新鲜事。一项调查显示,63%的被调查者赞成大学生当保姆,但是,当被问到自己家里是否会请大学生保姆时,却有近60%的人表示“不会”。以下哪项陈述如果为真,则能够合理地解释上述看似矛盾的现象?
在赛马比赛中,共有5位骑手:G、H、I、J、K,这5位骑手在各自的跑道上骑的赛马分别是5匹马之一:P、Q、R、S、T。已知以下信息:(1)G不是最先,就是最后到达终点。(2)J总是先于K到达终点。(3)H总是先于I到
由于冷冻食品的过程消耗能量,因此很多人使他们的电冰箱保持半空状态,只用它们贮存购买的冷冻食品。但是半空的电冰箱经常比装满的电冰箱消耗的能量更多。下面哪项如果是正确的,则最能解释上面描述的明显的矛盾?
两个正整数甲数和乙数的最大公约数是6,最小公倍数是90,如果甲数是18,那么乙数是m,则m的各个数位上数字之和为()。
从6人中选出4人分别到巴黎、伦敦、悉尼、莫斯科四个城市游览,要求每个城市有一人游览,每人只游览一个城市,且这6人中甲、乙两人不去巴黎游览,则不同的选择方案共有()。
结合材料回答问题:华为从容的背后,有我们时代的整体加持华为遭遇美国极限施压之际,任正非接受媒体采访的内容刷屏。中国企业与中国企业家的自信、大气与从容,呈现于谈笑风生之间。从时代的角度审视,我
《共产党宣言》中说,“资产阶级赖以形成的生产资料和交换手段,是在封建社会里造成的。在这些生产资料和交换手段发展的一定阶段上,封建社会的生产和交换在其中进行的关系,封建的农业和工场手工业组织,一句话,封建所有制关系就不再适应已经发展的生产力……这种生产关系已
简述中国特色社会主义法律体系的构成及其作用。
用配方法化下列二次型为标准形:f(x1,x2,x3)=2x1x2+2x1x3+6x2x3.
随机试题
在Windows操作系统中,________。
婴儿来自母体的______________抗体多于生后______________消失。
A、头孢唑林B、头孢克洛C、头孢噻肟D、青霉素E、头孢匹罗对肾脏毒性最大的是
纳税人通过自设非独立核算门市部销售的自产应税消费品,应当按照门市部对外销售额或者销售数量计算征收消费税。()
下列不属于档案本质特征的是()。
网络文件地址表示格式正确的是()。
Readthetextsfromamagazinearticleinwhichfivepersonstalkedabouttheirattitudetohelpingthepeopleindevelopingcou
TodayistheanniversaryofthatafternooninAprilayearagothatIfirstsawthestrangeandappealingdollinthewindowof
Nottoomanydecadesagoitseemed"obvious"bothtothegeneralpublicandtosociologiststhatmodemsocietyhaschangedpeopl
A、Toshowhowcommonmicrobesare.B、Toprovehowwellhisgardeningmethodswork.C、Toprovideanexampleofanuncommonmold.
最新回复
(
0
)