首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
admin
2023-02-13
120
问题
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of messages may have a different key than others.A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Each distinct pair of communicating parties must,ideally,share a different key,and perhaps each ciphertext exchanged as well.The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret.The difficulty of securely establishing a secret ________between two communicating parties,when a secure channel doesn’t already exist between them,also presents a chicken—and—egg problem which is a considerable practical obstacle for cryptography users in the real world.
Whitfield Diffie and Martin Hellman,authors of the first paper on public—key cryptography.
In a groundbreaking 1 976 paper,Whitfield Diffie and Martin Hellman proposed the notion of public—key(also,more generally,called asymmetric key)cryptography in which two different but mathematically related keys are used——a public key and a private key.A public key system is so constructed that calculation of one key(the private key)is computationally infeasible ________ the other(the public key),even though they are necessarily related.Instead,both keys are generated secretly,as an interrelated pair.The historian David Kahn described public—key cryptography as “the most revolutionary new concept in the field since poly—alphabetic substitution emerged in the Renaissance”.
In public-key cryptosystems,the ________ key may be freely distributed,while its paired private key must remain secret.The public key is typically used for encryption,while the private or secret key is used for decryption.Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie—Hellman key exchange protocol.
In 1978,Ronald Rivest,Adi Shamir,and Len Adleman invented ________,another public—key system.
In 1997,it finally became publicly known that asymmetric key cryptography had been invented by James H.Ellis at GCHQ,a British intelligence organization,and that,in the early 1970s,both the Diffie—Hellman and RSA algorithms had been previously developed(by Malcolm J.Williamson and Clifford Cocks,respectively).
④
选项
A、public
B、private
C、symmetric
D、asymmetric
答案
A
解析
转载请注明原文地址:https://www.kaotiyun.com/show/6F0D777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
张教授:除非所有的驾驶员都必然遵守交通规则,否则有些驾车导致的纠纷可能难以避免。李研究员:我不同意你的看法。以下哪一项确切地表达了张教授的看法?
5名同学相约去游乐场,一起挑战“邀游太空”项目,该设施共有前、后两排座位,每排12个,5名同学任意坐,则5名同学不全在同一排的概率为()。
长途汽车从A站出发,匀速行驶,1小时后突然发生故障,车速降低了40%,到B站终点延误达3小时,若汽车再多跑50公里后才发生故障,坚持行驶到B站能少延误1小时20分钟,那么A,B两地相距()公里。
在某项体育比赛中评委给一位同学打出的分数为:90,89,90,95,93,94,93,去掉一个最高分和一个最低分后,所剩数据的平均值和方差分别为()。
一射手对同一目标独立进行4次射击,若至少命中一次的概率是,则该射手的命中率是()。
党的十八大以来,习近平总书记就军民融合发展作出一系列重要论述,系统回答了军民融合为什么融、融什么、怎么融等根本性、方向性、全局性的重大问题。加快形成军民融合深度发展格局,需要()
马克思主义哲学认为,实践是人的有目的的活动,这种“有目的的活动不仅是指向自己,而且是为了通过消灭外部世界的规定(方面、特征、现象)来获得具有外部现实形式的实在性”。换言之,人在实践活动中并非仅受自然界及规律的制约,还要依据自己的目的利用客观规律去改变自然界
近年来,互联网、大数据、云计算、人工智能、区块链等技术加速创新,日益融入经济社会发展各领域全过程,数字经济发展速度之快、辐射范围之广、影响程度之深前所未有,正在成为重组全球要素资源、重塑全球经济结构、改变全球竞争格局的关键力量。发展数字经济是把握新一轮科技
结合材料回答问题:华为从容的背后,有我们时代的整体加持华为遭遇美国极限施压之际,任正非接受媒体采访的内容刷屏。中国企业与中国企业家的自信、大气与从容,呈现于谈笑风生之间。从时代的角度审视,我
怎样理解全面准确贯彻“一国两制”“港人治港”“澳人治澳”高度自治的方针?
随机试题
下列心电图应诊断为(图7)
A、片状引流B、纱条引流C、管状引流D、负压引流E、正压引流颞下、翼颌间隙感染口外切开引流术中常用的引流方式为
对牙本质过敏症描述不正确的是
下列哪项不属于关于子宫肌瘤的描述
莱菔子使用的注意事项是
甲曾任乙装修公司经理,2018年3月辞职。5月8日,为获得更优折扣,甲使用其留有的盖有乙公司公章的空白合同书。以乙公司名义与丙公司订立合同,购买总价15万元的地板。合同约定:6月7日丙公司将地板送至指定地点;乙公司于收到地板后3日内验货;地板经验收合格后,
由NaHS、MgSO4、NaHSO3组成的混合物中,已知硫元素的质量分数w(S)=a%,则O元素的质量分数w(O)为()。
资本家以货币形式支付给工人的工资是()。
经济规律:法则
ThereisnothingnewaboutTVandfashionmagazinesgivinggirlsunhealthyideasabouthowthintheyneedtobeinordertobec
最新回复
(
0
)