中文原创av,日韩黄色在线视频,欧美日韩操,亚洲精品国产精品国自产网站按摩,欧美日韩国产一区二区在线观看,男人久久久,亚洲精品久久网白云av

軟題庫 培訓(xùn)課程
當(dāng)前位置:信管網(wǎng) >> 在線考試中心 >> 試題查看
試題題型【單選題】
試題內(nèi)容

There are two general approaches to attacking a ()encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the () or even some sample plaintext-ciphertext pairs. This type of () exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ()-force attack, is to try every possible key on a piece of () until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.
A.stream  B.symmetric  C.a(chǎn)symmetric D.a(chǎn)dvanced
A.operation B.publication  C.plaintext  D.ciphertext
A.message  B.knowledge  C.a(chǎn)lgorithm  D.a(chǎn)ttack
A.brute  B.perfect   C.a(chǎn)tribue   D.re search
A.plaintext  B.ciphertext  C.sample  D.code

查看答案

相關(guān)試題