2025年软考信息安全工程师下午真题解析视频教程
4066 人在学
2019上半年信息安全工程师考试已结束,课课家小编为大家整理了2019上半年信息安全工程师上午基础知识真题八部分,供大家参考。
71-75、The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and to their applications. A block cipher is, in a sense, a modern embodiment of Alberti's polyalphabetic cipher: block ciphers take as input a block of (71 )and a key, and output a block of ciphertext of the same size. Since messages are almost always longer than a single block, some method of knitting together successive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and must be carefully considered when using a block cipher in a cryptosystem.
The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are( 72 )designs which have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted). Despite its deprecation as an official standard, DES (especially its still-approved and much more secure triple-DES variant) remains quite popular; it is used across a wide range of applications, from ATM encryption to e-mail privacy and secure remote access. Many other block ciphers have been designed and released, with considerable variation in quality. Many have been thoroughly broken. See Category: Block ciphers.
Stream ciphers, in contrast to the ‘block’type, create an arbitrarily long stream of key material, which is combined ( 73 )the plaintext bit-by-bit or character-by-character, somewhat like the one-time pad. In a stream cipher, the output( 74 )is created based on an internal state which changes as the cipher operates. That state change is controlled by the key, and, in some stream ciphers, by the plaintext stream as well. RC4 is an example of a well-known, and widely used, stream cipher; see Category: Stream ciphers.
Cryptographic hash functions (often called message digest functions) do not necessarily use keys, but are a related and important class of cryptographic algorithms. They take input data (often an entire message), and output a short fixed length hash, and do so as a one-way function. For good ones, ( 75 ) (two plaintexts which produce the same hash) are extremely difficult to find.
Message authentication codes (MACs) are much like cryptographic hash functions, except that a secret key is used to authenticate the hash value on receipt. These block an attack against plain hash functions.
(71)A.plaintext
B.ciphertext
C.data
D.hash
(72)A.stream cipher
B.hash function
C.Message authentication code
D.Block cipher
(73)A.of
B.for
C.with
D.in
(74)A.hash
B.stream
C.ciphertext
D.plaintext
(75)A.collisons
B.image
C.preimage
D.solution
课课家教育专注软考培训10年以上,一直坚持自主研发,将丰富的软考培训经验有效融入教程研发过程,自成体系的软考视频教程、软考培训教材和软考在线题库,使考生的学习更具系统性,辅导更具针对性。想要报考2020年软考的考生现在就可以开始备考了,报名课课家软考各科目考试赠送:辅导教材、历年真题、考前冲剌资料、在线模拟测试题库、老师专属答疑指导等,以保障学员顺利通过考试。
>>>>>>点击进入软考报名专题
共7节 · 11小时16分钟套餐优惠
¥199.004034人在学
共6节 · 6小时55分钟套餐优惠
¥199.004066人在学
共100节 · 23小时18分钟套餐优惠
¥299.0068885人在学
共77节 · 24小时31分钟套餐优惠
¥399.006751人在学