信管网试题内容

导航

试卷名称:2014年下半年网络规划设计师考试上午真题试题(综合知识)

考试年份:2016年下半年

试题来源:《2014年下半年网络规划设计师考试上午真题试题(综合知识)》在线考试

试题内容

There are two general approaches to attacking a ()encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the () or even some sample plaintext-ciphertext pairs. This type of () exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ()-force attack, is to try every possible key on a piece of () until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.
A.stream  B.symmetric  C.asymmetric D.advanced
A.operation B.publication  C.plaintext  D.ciphertext
A.message  B.knowledge  C.algorithm  D.attack
A.brute  B.perfect   C.atribue   D.re search
A.plaintext  B.ciphertext  C.sample  D.code

参考答案:B、C、D、A、B(仅供参考) 收藏

【解析】

普通会员无法查看试题解析。[开通试题解析服务]