刷题刷出新高度,偷偷领先!偷偷领先!偷偷领先! 关注我们,悄悄成为最优秀的自己!

单选题


There are two general approaches to attacking a (1)encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( ) or even some sample plaintext- ciphertext pairs. This type of ( ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ( )-force attack, is to try every possible key on a piece of ( ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.

(1)处应选________.

A
stream
B
symmetric
C
asymmetric
D
advanced
使用微信搜索喵呜刷题,轻松应对考试!

答案:

B

解析:

根据句子结构和语境分析,第一空应填入一个描述加密方式的名词,选项中只有symmetric(对称加密)符合语境。因此正确答案为B。其他选项如stream(流加密)、asymmetric(非对称加密)和advanced(高级)都不符合句子结构和语境要求。

创作类型:
原创

本文链接:There are two general approaches to attacking a (1

版权声明:本站点所有文章除特别声明外,均采用 CC BY-NC-SA 4.0 许可协议。转载请注明文章出处。

让学习像火箭一样快速,微信扫码,获取考试解析、体验刷题服务,开启你的学习加速器!

分享考题
share