全部科目 > 信息安全工程师 >
2022年下半年 上午试卷 综合知识
第 72 题
知识点 数据加密  
章/节 网络攻击常见技术方法  
 
 
Perhaps the most obvious difference between private-key andpublic-key encryption is that the former assumes complete secrecyof all cryptographic keys, whereas the latter requires secrecy foronly the private key.Although this may seem like a minor distinction ,the ramifications are huge: in the private-key setting thecommunicating parties must somehow be able to share the (71) keywithout allowing any third party to learn it, whereas in the public-key setting the (72) key can be sent from one party to the other overa public channel without compromising security.For partiesshouting across a room or, more realistically , communicating overa public network like a phone line or the nternet, public-keyencryption is the only option.
Another important distinction is that private-key encryption schemesuse the (73) key for both encryption and decryption, whereas publickey encryption schemes use (74) keys for each operation.That is public-key encryption is inherently asymmetric.This asymmetry in thepublic-key setting means that the roles of sender and receiver are notinterchangeable as they are in the private-key setting; a single key-pair allows communication in one direction only.(Bidirectionalcommunication can be achieved in a number of ways; the point is thata single invocation of a public-key encryption scheme forces adistinction between one user who acts as a receiver and other userswho act as senders.)ln addition, a single instance of a (75) encryptionscheme enables multiple senders to communicate privately with asingle receiver,in contrast to the private-key case where a secret keyshared between two parties enables private communication onlybetween those two parties. 
 
  A.  stream 
 
  B.  different
 
  C.  public
 
  D.  secret




 
 
相关试题     网络攻击常见技术方法 

  第57题    2022年下半年  
拒绝服务攻击是指攻击者利用系统的缺陷,执行一些恶意操作,使得合法用户不能及时得到应得的服务或者系统资源。常见的拒绝服务攻击包括:UDP 风暴、SYN Flood、IC..

  第14题    2025年下半年  
端口扫描的目的是找出目标系统上提供的服务列表。根据扫描利用的技术不同,端口扫描可以分为完全连接扫描、半连接扫描、SYN扫描、FIN扫描、隐蔽扫描、ACK扫描、N..

  第73题    2021年下半年  
Methods for(71)people differ significantly from those for authenticating machines and programs, and this is because of the major differences in the ca..

 
知识点讲解
· 数据加密
 
        数据加密
        网络攻击者常常采用数据加密技术来逃避网络安全管理人员的追踪。加密使网络攻击者的数据得到有效保护,即使网络安全管理人员得到这些加密的数据,没有密钥也无法读懂,这样就实现了攻击者的自身保护。攻击者的安全原则是,任何与攻击有关的内容都必须加密或者立刻销毁。



更多复习资料
请登录电脑版软考在线 www.rkpass.cn

京B2-20210865 | 京ICP备2020040059号-5
京公网安备 11010502032051号 | 营业执照
 Copyright ©2000-2025 All Rights Reserved
软考在线版权所有