刷题刷出新高度,偷偷领先!偷偷领先!偷偷领先! 关注我们,悄悄成为最优秀的自己!

单选题

The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and to their applications. A block cipher is, in a sense, a modern embodiment of Alberti's polyalphabetic cipher: block ciphers take as input a block of ()and a key, and output a block of ciphertext of the same size. Since messages are almost always longer than a single block, some method of knitting together successive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and must be carefully considered when using a block cipher in a cryptosystem.

The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are( )designs which have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted). Despite its deprecation as an official standard, DES (especially its still-approved and much more secure triple-DES variant) remains quite popular; it is used across a wide range of applications, from ATM encryption to e-mail privacy and secure remote access. Many other block ciphers have been designed and released, with considerable variation in quality. Many have been thoroughly broken. See Category: Block ciphers.

Stream ciphers, in contrast to the ‘block’type, create an arbitrarily long stream of key material, which is combined ( )the plaintext bit-by-bit or character-by-character, somewhat like the one-time pad. In a stream cipher, the output( )is created based on an internal state which changes as the cipher operates. That state change is controlled by the key, and, in some stream ciphers, by the plaintext stream as well. RC4 is an example of a well-known, and widely used, stream cipher; see Category: Stream ciphers.

Cryptographic hash functions (often called message digest functions) do not necessarily use keys, but are a related and important class of cryptographic algorithms. They take input data (often an entire message), and output a short fixed length hash, and do so as a one-way function. For good ones, (请作答此空) (two plaintexts which produce the same hash) are extremely difficult to find.

Message authentication codes (MACs) are much like cryptographic hash functions, except that a secret key is used to authenticate the hash value on receipt. These block an attack against plain hash functions.

A
collisons
B
image
C
preimage
D
solution
使用微信搜索喵呜刷题,轻松应对考试!

答案:

A

解析:

第一空在描述对称密钥密码学的研究与块密码和流密码及其应用的关联,关于块密码的工作原理,它接收一个数据块和一个密钥作为输入,输出相同大小的密文块,所以选项A "collisions"符合语境,表示两个或多个输入产生相同的输出。

第二空描述流密码的工作方式,是与明文逐位或逐字符结合生成任意长的密钥材料流,因此选项B "结合(combined)"是恰当的。

第三空描述流密码的输出是基于内部状态的变化产生的,这个状态变化由密钥控制,因此应该描述这个输出为随机生成的序列,选项C "randomly generated output sequence"符合此描述。

最后一个空描述好的加密哈希函数的特点,即找到两个能产生相同哈希值的明文是非常困难的,因此选项D符合描述。

创作类型:
原创

本文链接:The modern study of symmetric-key ciphers relates

版权声明:本站点所有文章除特别声明外,均采用 CC BY-NC-SA 4.0 许可协议。转载请注明文章出处。

让学习像火箭一样快速,微信扫码,获取考试解析、体验刷题服务,开启你的学习加速器!

分享考题
share