刷题刷出新高度,偷偷领先!偷偷领先!偷偷领先! 关注我们,悄悄成为最优秀的自己!

单选题

There are two general approaches to attacking a ( )encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( ) or even some sample plaintext- ciphertext pairs. This type of ( 3 ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ( )-force attack, is to try every possible key on a piece of ( ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.

(3)应选__________.

A
message
B
knowledge 
C
algorithm 
D
attack
使用微信搜索喵呜刷题,轻松应对考试!

答案:

D

解析:

根据题目描述,第三种情况是对加密算法的攻击方式的一种描述。前文提到了cryptanalysis(密码分析)这种攻击方式,它依赖于算法的性质以及可能对算法的一些特性的了解,甚至是一些明文-密文对的样本。因此,括号中应该填写的是“攻击(attack)”的方式,即对加密算法的攻击类型,所以答案是D。

创作类型:
原创

本文链接:There are two general approaches to attacking a (

版权声明:本站点所有文章除特别声明外,均采用 CC BY-NC-SA 4.0 许可协议。转载请注明文章出处。

让学习像火箭一样快速,微信扫码,获取考试解析、体验刷题服务,开启你的学习加速器!

分享考题
share