Therearetwogeneralapproachestoattackinga()encryptionscheme.Thefirstattackisknownascryptanalysis.Cryptanalyticattacksrelyonthenatureofthealgorithmplusperhapssomeknowledgeofthegeneralcharacteristicsofthe(请作答此空)orevensomesampleplaintext-ciphertextpairs.Thist

欢迎免费使用小程序搜题/刷题/查看解析,提升学历,成考自考报名,论文代写、论文查重请加客服微信skr-web

Therearetwogeneralapproachestoattackinga()encryptionscheme.Thefirstattackisknownascryptanalysis.Cryptanalyticattacksrelyonthenatureofthealgorithmplusperhapssomeknowledgeofthegeneralcharacteristicsofthe(请作答此空)orevensomesampleplaintext-ciphertextpairs.Thistypeof()exploitsthecharacteristicsofthealgorithmtoattempttodeduceaspecificplaintextortodeducethekeybeingused.Iftheattacksucceedsindeducingthekey,theeffectiscatastrophic:Allfutureandpastmessagesencryptedwiththatkeyarecompromised.Thesecondmethod,knownasthe()-forceattack,istotryeverypossiblekeyonapieceof()untilanintelligibletranslationintoplaintextisobtained.Onaverage,halfofallpossiblekeysmustbetriedtoachievesuccess.

A.operation
B.publication
C.plaintext
D.ciphertext
正确答案C
访客
邮箱
网址

通用的占位符缩略图

人工智能机器人,扫码免费帮你完成工作


  • 自动写文案
  • 自动写小说
  • 马上扫码让Ai帮你完成工作
通用的占位符缩略图

人工智能机器人,扫码免费帮你完成工作

  • 自动写论文
  • 自动写软件
  • 我不是人,但是我比人更聪明,我是强大的Ai
Top