软考在线  |  计算机技术与软件专业技术资格(水平)考试   |   [请选择科目]
[ 成为 VIP会员 ]        登录  |  注册      我的  购物车
 
科目切换  联系我们 
免费智能真题库 > 历年试卷 > 信息安全工程师 > 2020年下半年 信息安全工程师 上午试卷 综合知识
  第72题      
  章/节:   网络信息安全专业英语       

 
Symmetric-key cryptosystems use the (71 ) key for encryption and decryption of a message,though a message or group of messages may have a different key than others. A significant disadvantage of symmetric ciphers is the key management necessary to use them securely. Each distinct pair of communicating parl ies must, ideally, share a different key, and perhaps each ciphertext exchanged as well. The number of keys required increases as the square of the number of network members, which very quickly requires complex key management schemes to keep them all straight and secret. The difficulty of securely establishing a secret (72) between two communicating parties, when a secure channel doesn’t already exist between them, also presents a chicken-and-egg problem which is a considerable practical obstacle for cryptography users in the real world.
Whitfield Diffie and Martin Heilman, authors of the first paper on public-key cryptography.
In a groundbreaking 1976 paper. Whitfield Diffie and Martin Heilman proposed the notion of public-key (also, more generally, called asymmetric key) cryptography in which two different but mathematically related keys are used—a public key and a private key. A public key system is so constructed that calculation of one key (the private key) is computationally infeasible _(73) the other (the public key), even though they are necessarily related. Instead, both keys are generated secretly, as an interrelated pair. The historian David Kahn described public-key cryptography as “the most revolutionary new concept in the field since poly-alphabetic substitution emerged in the Renaissance”.
In public-key cryptosystems, the (74) key may be freely distributed, while its paired private key must remain secret. The public key is typically used for encryption, while the private or secret key is used for decryption. Diffie and Heilman showed that public-key cryptography was possible by presenting the Diffie-Heilman key exchange protocol.
In 1978, Ronald Rivest, Adi Shamir, and Len Adleman invented (75),another public-key system.
In 1997,it finally became publicly known that asymmetric key cryptography had been invented by James H. Ellis at GCHQ, a British intelligence organization, and that, in the early 1970s, both the Diffie-Hellman and RSA algorithms had been previously developed (by Malcolm J. Williamson and Clifford Cocks, respectively).
 
 
  A.  plaintext
 
  B.  stream
 
  C.  ciphertext
 
  D.  key
 
 
 

 
  第71题    2017年上半年  
   72%
There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends ..
  第73题    2020年下半年  
   61%
Symmetric-key cryptosystems use the (71 ) key for encryption and decryption of a message,though a message or group of me..
  第73题    2019年上半年  
   58%
The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and to their a..
   题号导航      2020年下半年 信息安全工程师 上午试卷 综合知识   本试卷我的完整做题情况  
1 /
2 /
3 /
4 /
5 /
6 /
7 /
8 /
9 /
10 /
11 /
12 /
13 /
14 /
15 /
 
16 /
17 /
18 /
19 /
20 /
21 /
22 /
23 /
24 /
25 /
26 /
27 /
28 /
29 /
30 /
 
31 /
32 /
33 /
34 /
35 /
36 /
37 /
38 /
39 /
40 /
41 /
42 /
43 /
44 /
45 /
 
46 /
47 /
48 /
49 /
50 /
51 /
52 /
53 /
54 /
55 /
56 /
57 /
58 /
59 /
60 /
 
61 /
62 /
63 /
64 /
65 /
66 /
67 /
68 /
69 /
70 /
71 /
72 /
73 /
74 /
75 /
 
第72题    在手机中做本题
    在线人数   共计 8911人 在线 
    jjyxr@163...     yanliangpo..     qibingshan..     yhl@lit.ed..     junhong044..     morica2006..
    lyqsjh@163..     tjqin2008@..     lulin@163...     1860cuilin..     874677054@..     tangcoms@1..
    wwidc@163...     htawlh@126..     zengfei369..     zengtianru..     xy98988@16..     domgfangru..
    ygzgz74309..     jzyjs678@1..     yanleiya@1..     camphj@126..     zhangzhime..     morica2006..
    bamfk@tom...     kd08@126.c..     chengaoxin..     luo4226@si..     895775035@..     sddzzhangk..
    wodexiajia..     cymnj@yaho..     719835985@..     zhuyucheng..     lhc27@163...     fengyunk83..
    1350611007..     xujian9898..     lxf@aiai.e..     pamela.081..     zhoumh@wzu..     qddhss@soh..

本网站所有产品设计(包括造型,颜色,图案,观感,文字,产品,内容),功能及其展示形式,均已受版权或产权保护。
任何公司及个人不得以任何方式复制部分或全部,违者将依法追究责任,特此声明。
本站部分内容来自互联网或由会员上传,版权归原作者所有。如有问题,请及时联系我们。



京B2-20210865 | 京ICP备2020040059号-5 |京公网安备 11010502032051号 | 营业执照 | Copyright ©2000-2025 All Rights Reserved 软考在线版权所有