首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
admin
2023-02-13
102
问题
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of messages may have a different key than others.A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Each distinct pair of communicating parties must,ideally,share a different key,and perhaps each ciphertext exchanged as well.The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret.The difficulty of securely establishing a secret ________between two communicating parties,when a secure channel doesn’t already exist between them,also presents a chicken—and—egg problem which is a considerable practical obstacle for cryptography users in the real world.
Whitfield Diffie and Martin Hellman,authors of the first paper on public—key cryptography.
In a groundbreaking 1 976 paper,Whitfield Diffie and Martin Hellman proposed the notion of public—key(also,more generally,called asymmetric key)cryptography in which two different but mathematically related keys are used——a public key and a private key.A public key system is so constructed that calculation of one key(the private key)is computationally infeasible ________ the other(the public key),even though they are necessarily related.Instead,both keys are generated secretly,as an interrelated pair.The historian David Kahn described public—key cryptography as “the most revolutionary new concept in the field since poly—alphabetic substitution emerged in the Renaissance”.
In public-key cryptosystems,the ________ key may be freely distributed,while its paired private key must remain secret.The public key is typically used for encryption,while the private or secret key is used for decryption.Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie—Hellman key exchange protocol.
In 1978,Ronald Rivest,Adi Shamir,and Len Adleman invented ________,another public—key system.
In 1997,it finally became publicly known that asymmetric key cryptography had been invented by James H.Ellis at GCHQ,a British intelligence organization,and that,in the early 1970s,both the Diffie—Hellman and RSA algorithms had been previously developed(by Malcolm J.Williamson and Clifford Cocks,respectively).
①
选项
A、different
B、same
C、public
D、private
答案
B
解析
转载请注明原文地址:https://www.kaotiyun.com/show/2F0D777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
小明周末参加了学校组织的野营,现已知,早上小明以5千米/小时的速度从学校赶往集合地点;野营结束后,又以10千米/小时的速度原路返回学校,那么小明在这次往返过程中的平均速度为()千米/小时。
国庆长假,赵大、钱二、张珊、李思、王伍五位同事打算出国游玩,因为时间有限,每个人只能从泰国、新加坡、马来西亚、日本、韩国五个国家中选择两个国家游玩,并且每个国家也恰好有两个人选择。同时还需要满足以下奈件:(1)如果赵大去马来西亚,则张珊不去泰国。
某市要建花园或修池塘,已知:修了池塘就要架桥,架了桥就不能建花园,建花园必须植树,植树必须架桥。若以上信息为真,则以下哪项不可能为真?
某种产品有4只次品和6只正品,每只产品均不相同且可区分,每次取出一只测试,直到4只次品全部测出为止,则最后一只次品恰好在第五次测试时被发现的不同情况有()。
从5位男教师和4位女教师中选出3位教师,派到3个班担任班主任(每班1位班主任),要求这3位班主任中男、女教师都要有,则不同的选派方案共有()。
恩格斯说:“如果世间有什么确定不移的就是:我们党和工人阶级只有在民主共和制的形式下,才能取得统治,这甚至适于无产阶级专政的特有形式。”人民民主是社会主义的生命。社会主义民主是人类社会最高类型的民主,与以往剥削阶级占统治地位的社会的少数人的民主在性质上不同。
封建社会的经济以自然经济为主要形式,自然经济是一种以自给自足为特征的经济形式,自然经济以分散的、自给自足的家庭生产为基础,生产规模狭小,社会分工低下。封建社会农民生产的劳动产品与商品最大的区别在于()
《共产党宣言》中说,“资产阶级赖以形成的生产资料和交换手段,是在封建社会里造成的。在这些生产资料和交换手段发展的一定阶段上,封建社会的生产和交换在其中进行的关系,封建的农业和工场手工业组织,一句话,封建所有制关系就不再适应已经发展的生产力……这种生产关系已
如今,越来越多的购物通过网络完成,消费者根本见不到商家实体商店和商家长相,当今社会的公共生活领域,则更像一个“陌生人社会”。这体现了社会公共生活具有()
在物联网的三层架构中,________负责信息采集和物物之间的信息传输。
随机试题
MRP系统中主生产计划是由市场预测和()所决定。
在现代中国56个民族中,除汉族外,有自己语言文字的民族有()
良性前列腺增生的典型症状是()。
甲企业与其关联方签署了成本分摊协议,共同开发无形资产,并约定退出补偿时协议成果转让给关联方,该成本分摊协议符合独立交易原则,下列关于甲企业成本分摊的税务处理中,正确的有()。(2016年)
原则上,物权人可以自由抛弃其物权。但抛弃物权妨害他人利益的,不得抛弃。下列物权中,不得抛弃的有()。
2,3,20,92,448,()
下列关于党的建设理论的说法,正确的是()。
关于刑事管辖权,下列哪一选项是不正确的?()
Atschoolwewentoveroursocialnetworkingguidelines.【C1】______theobvious—don’tbeinappropriatewithstudentsthroughtexti
MassProduction:MethodandImpactP1:EvenwiththeearlysuccessesinEurope,scholarsoftechnologyattributethewidespread
最新回复
(
0
)