首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
admin
2023-02-13
89
问题
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of messages may have a different key than others.A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Each distinct pair of communicating parties must,ideally,share a different key,and perhaps each ciphertext exchanged as well.The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret.The difficulty of securely establishing a secret ________between two communicating parties,when a secure channel doesn’t already exist between them,also presents a chicken—and—egg problem which is a considerable practical obstacle for cryptography users in the real world.
Whitfield Diffie and Martin Hellman,authors of the first paper on public—key cryptography.
In a groundbreaking 1 976 paper,Whitfield Diffie and Martin Hellman proposed the notion of public—key(also,more generally,called asymmetric key)cryptography in which two different but mathematically related keys are used——a public key and a private key.A public key system is so constructed that calculation of one key(the private key)is computationally infeasible ________ the other(the public key),even though they are necessarily related.Instead,both keys are generated secretly,as an interrelated pair.The historian David Kahn described public—key cryptography as “the most revolutionary new concept in the field since poly—alphabetic substitution emerged in the Renaissance”.
In public-key cryptosystems,the ________ key may be freely distributed,while its paired private key must remain secret.The public key is typically used for encryption,while the private or secret key is used for decryption.Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie—Hellman key exchange protocol.
In 1978,Ronald Rivest,Adi Shamir,and Len Adleman invented ________,another public—key system.
In 1997,it finally became publicly known that asymmetric key cryptography had been invented by James H.Ellis at GCHQ,a British intelligence organization,and that,in the early 1970s,both the Diffie—Hellman and RSA algorithms had been previously developed(by Malcolm J.Williamson and Clifford Cocks,respectively).
②
选项
A、plaintext
B、stream
C、ciphertext
D、key
答案
D
解析
转载请注明原文地址:https://www.kaotiyun.com/show/9F0D777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
现有一卷长度为100米的铁丝网,靠墙围成三个面积相等的长方形围栏(如图17—1所示),则能围成的最大面积为()平方米。
某工厂每日需要消耗甲材料5吨,每吨价格1000元,仓库储存1吨甲材料每日花费4元,购进甲材料每次需要花费运输费用1000元,若要每天有关甲材料的花费最少,则应该每()天购入一次。
5名同学相约去游乐场,一起挑战“邀游太空”项目,该设施共有前、后两排座位,每排12个,5名同学任意坐,则5名同学不全在同一排的概率为()。
一位粒子物理学家开玩笑说:“自1950年以来,所有的费米子都是在美国发现的,所有的玻色子都是在欧洲发现的。很遗憾,希格斯粒子是玻色子,所以,它不可能在美国被发现。”必须补充下面哪一项假设,上述推理才能成立?
如图所示,四边形ABCD是边长为2cm的正方形,动点P在ABCD的边上沿A→B→C→D的路径以1cm/s的速度运动(点P不与A、D重合),在这个运动过程中,△APD的面积s(cm2)随时间t(s)的变化关系用图像表示,正确的为()。
党的十八大以来,习近平总书记就军民融合发展作出一系列重要论述,系统回答了军民融合为什么融、融什么、怎么融等根本性、方向性、全局性的重大问题。加快形成军民融合深度发展格局,需要()
2021年9月10日,第18届中国-东盟博览会和中国-东盟商务与投资峰会在广西南宁开幕。习近平主席致贺信表示,中国和东盟建立对话关系30年来,双方全方位合作不断深化,互为最大贸易伙伴,成为亚太区域最具活力的合作。本次会议的主题是()
________是提升国民经济整体素质、赢得国际经济竞争主动权的根本途径,是加快转变经济发展方式的主攻方向。()
怎样理解全面准确贯彻“一国两制”“港人治港”“澳人治澳”高度自治的方针?
中国近代史上人民第一次大规模的反侵略武装斗争是()。
随机试题
A、Ds.B、Bs.C、Cs.D、As.C女士说如果选的答案大部分是B,那你就是一个理想主义者,故C正确。大部分选A的人是artisan,大部分选C的人是guardian。听音时要对应好什么样的人主要选什么选项。
深Ⅱ度烧伤如无感染的愈合时间为
A、偶氮偶联法B、马来酐试剂C、葡萄糖氧化酶法D、多聚电解质离子解离法E、特异性酯酶法有关尿干化学检测原理,葡萄糖测定用
男婴,3天。黄疸程度加重2天,足月儿,母乳喂养。母亲血型为O型、Rh阳性,父亲血型为AB型、Rh阳性,实验室检查:TBil289μmol/L。首选应采取的治疗措施是
引起产褥感染最常见的病原菌是
FIDIC的宗旨是促使会员企业实现商业利益,成为国际上工程咨询业的会员之家,并向各成员协会乃至全社会传播()。
【背景资料】某集团公司中标新建普速电气化铁路综合第一标段,主要项目内容有:路基、桥涵、隧道、轨道、电力、电力牵引供电、通信、信号、房建工程以及相应的大临及辅助工程。该标段起止里程为DK00+000~DK27+600,其中DK20+000
生活中人们常说,温故知新,熟能生巧。学习中老师也经常要求学生要有一定数量的重复练习。学生要获得知识,不能没有复习,但是复习却要讲求方式和方法,要适度。请问怎样组织复习才能减少遗忘,提高记忆效果?
“请君入瓮、解甲归田”两个成语的结构分别是().
有以下程序#include<stdio.h>main(){inti,j,x=0;for(i=0;i<2;i++){x++;
最新回复
(
0
)