刷题刷出新高度,偷偷领先!偷偷领先!偷偷领先! 关注我们,悄悄成为最优秀的自己!

单选题

l Symmetric-key cryptosystems use the  (1)  key for encryption and decryption of a message,though a message or group of messages may have a different key than others .A significant disadvantage of symmetric ciphers is the key management necessary to use them securely. Each distinct pair of communicating parties must, ideally, share a different key, and perhaps each ciphertext exchanged as Well. The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret. The difficulty of securely establishing a secret  (2)  between two communicating parties,when a secure channel doesn’t already exist between them, also presents a chicken-and-egg problem which is a considerable practical obstacle for cryptography users in the real world.

Whitfield Diffie and Martin Hellman, authors of the first paper on public-key cryptography. In a groundbreaking 1976 paper,Whitfield Diffie and Martin Hellman proposed the notion of public-key (also, more generally, called asymmetric key) cryptography in which two different but mathematically related keys are used — a public key and a private key.A public key system is so constructed that calculation of one key (the private key) is computationally infeasible  (3)  the other (the public key), even though they are necessarily related. Instead, both keys are generated secretly, as an interrelated pair. The historian David Kahn described public-key cryptography as “the most revolutionary new concept in the field since poly-alphabetic substitution emerged in the Renaissance”.

In public-key cryptosystems, the  (4)  key may be freely distributed, while its paired private key must remain secret. The public key is typically used for encryption, while the private or secret key is used for decryption. Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie-Hellman key exchange protocol.

In 1978, Ronald Rivest, Adi Shamir, and Len Adleman invented  (5) , another public-key system.

In 1997, it finally became publicly known that asymmetric key cryptography had been invented by James H.Ellis at GCHQ, a British intelligence organization, and that, in the early 1970s,both the Diffie-Hellman and RSA algorithms had been previously developed (by Malcolm J.Williamson and Clifford Cocks,respectively) .

A
different
B
same
C
public
D
private
使用微信搜索喵呜刷题,轻松应对考试!

答案:

B

解析:

(1)B same(相同的密钥用于加密和解密)符合题目描述。对称密钥密码体制使用相同的密钥对消息进行加密和解密。因此正确答案为B。

(2)题目提到在现实世界中,当不存在安全通道时,在通信双方之间安全地建立密钥是一个鸡和蛋的问题,因此需要一个公开的方式来建立密钥,即公开密钥(public key)。因此正确答案为C。

(3)在公钥密码系统中,一个密钥(私钥)无法轻易从另一个密钥(公钥)计算得出,这是通过数学上的困难性实现的。因此,正确答案是A different(不同的)。这意味着公钥和私钥在数学上是相关的,但从一个到另一个的计算是困难的。

(4)在公钥密码系统中,公钥是可以自由分发的,用于加密消息。因此正确答案为C public。私钥则是保密的,用于解密消息。这两个密钥是配对使用的。

(5)根据题目描述,在公钥密码系统中提到了RSA算法,这是一种基于公钥密码体制的非对称加密算法。因此正确答案为RSA。

创作类型:
原创

本文链接:l Symmetric-key cryptosystems use the  (1)  key fo

版权声明:本站点所有文章除特别声明外,均采用 CC BY-NC-SA 4.0 许可协议。转载请注明文章出处。

让学习像火箭一样快速,微信扫码,获取考试解析、体验刷题服务,开启你的学习加速器!

分享考题
share