刷题刷出新高度,偷偷领先!偷偷领先!偷偷领先! 关注我们,悄悄成为最优秀的自己!

单选题

There are two general approaches to attacking a ( )encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( 2 ) or even some sample plaintext- ciphertext pairs. This type of ( ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ( )-force attack, is to try every possible key on a piece of ( ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.

(2)处应选_________.

A
operation
B
publication
C
plaintext
D
 ciphertext 
使用微信搜索喵呜刷题,轻松应对考试!

答案:

B

解析:

根据题目描述,第一种攻击方式依赖于算法的性质以及对加密算法或某些样本明文密文对的了解,第二种攻击方式是对加密算法进行暴力破解尝试,尝试每一种可能的密钥直到获得可理解的明文翻译为止。因此,第二空需要填入的词语应该与加密算法相关,而publication(出版物)与加密算法没有直接关系,不符合语境。而operation(操作)和plaintext(明文)虽然与加密过程有关,但不如ciphertext(密文)更贴近语境。因此,正确答案是B,即ciphertext。

创作类型:
原创

本文链接:There are two general approaches to attacking a (

版权声明:本站点所有文章除特别声明外,均采用 CC BY-NC-SA 4.0 许可协议。转载请注明文章出处。

让学习像火箭一样快速,微信扫码,获取考试解析、体验刷题服务,开启你的学习加速器!

分享考题
share