当前位置: 答题翼 > 问答 > 计算机类考试 > 正文
目录: 标题| 题干| 答案| 搜索| 相关
问题

There are two general approaches to attacking a ()encryption scheme.The first attack is k


There are two general approaches to attacking a ()encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the () or even some sample plaintext-ciphertext pairs. This type of () exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ()-force attack, is to try every possible key on a piece of () until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.

A.stream B.symmetric C.asymmetric D.advancedA.operation B.publication C.plaintext D.ciphertextA.message B.knowledge C.algorithm D.attackA.brute B.perfect C.atribue D.re searchA.plaintext B.ciphertext C.sample D.code

请帮忙给出正确答案和分析,谢谢!

参考答案
您可能感兴趣的试题
  • Generally speaking, performatives are sub-divided into two big types. They are explic

  • There are two main approaches to the study of English words namely()A、descriptive and p

  • There are two approaches to translating: first, you start translating sentence and senten

  • Look! There are______grazing over there.A.two cattiesB.two head of cattiesC.two cattleD.tw

  • Generally speaking there are two systems of primary and secondary education in Britain --- the state school and the independent school or the () school.

  • Generally there are television programs for children on Saturday. ()