刷题刷出新高度,偷偷领先!偷偷领先!偷偷领先! 关注我们,悄悄成为最优秀的自己!

单选题

There are two general approaches to attacking a ( )encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( ) or even some sample plaintext- ciphertext pairs. This type of ( ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ( )-force attack, is to try every possible key on a piece of ( 5 ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.

(5)处应选_______.

A
plaintext
B
ciphertext 
C
sample
D
code
使用微信搜索喵呜刷题,轻松应对考试!

答案:

D

解析:

根据原文描述,第二种攻击方法被称为穷举攻击,该方法是对一段加密信息进行尝试每一种可能的密钥,直到获得可理解的明文翻译。因此,此处应选code,表示加密的信息。所以答案为D。

创作类型:
原创

本文链接:There are two general approaches to attacking a (

版权声明:本站点所有文章除特别声明外,均采用 CC BY-NC-SA 4.0 许可协议。转载请注明文章出处。

让学习像火箭一样快速,微信扫码,获取考试解析、体验刷题服务,开启你的学习加速器!

分享考题
share