下载安卓APP箭头
箭头给我发消息

客服QQ:3315713922

2019上半年信息安全工程师上午基础知识真题(八)

作者:匿名     来源: 互联网点击数:842发布时间: 2020-02-05 16:36:07

标签: 2019年信息安全工程师上午真题信息安全工程师上午真题2019上半年信息安全工程师真题

软考,您想通过吗?一次通过才是硬道理

  2019上半年信息安全工程师考试已结束,课课家小编为大家整理了2019上半年信息安全工程师上午基础知识真题八部分,供大家参考。

  71-75、The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and to their applications. A block cipher is, in a sense, a modern embodiment of Alberti's polyalphabetic cipher: block ciphers take as input a block of (71 )and a key, and output a block of ciphertext of the same size. Since messages are almost always longer than a single block, some method of knitting together successive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and must be carefully considered when using a block cipher in a cryptosystem.

  The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are( 72 )designs which have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted). Despite its deprecation as an official standard, DES (especially its still-approved and much more secure triple-DES variant) remains quite popular; it is used across a wide range of applications, from ATM encryption to e-mail privacy and secure remote access. Many other block ciphers have been designed and released, with considerable variation in quality. Many have been thoroughly broken. See Category: Block ciphers.

  Stream ciphers, in contrast to the ‘block’type, create an arbitrarily long stream of key material, which is combined ( 73 )the plaintext bit-by-bit or character-by-character, somewhat like the one-time pad. In a stream cipher, the output( 74 )is created based on an internal state which changes as the cipher operates. That state change is controlled by the key, and, in some stream ciphers, by the plaintext stream as well. RC4 is an example of a well-known, and widely used, stream cipher; see Category: Stream ciphers.

  Cryptographic hash functions (often called message digest functions) do not necessarily use keys, but are a related and important class of cryptographic algorithms. They take input data (often an entire message), and output a short fixed length hash, and do so as a one-way function. For good ones, ( 75 ) (two plaintexts which produce the same hash) are extremely difficult to find.

  Message authentication codes (MACs) are much like cryptographic hash functions, except that a secret key is used to authenticate the hash value on receipt. These block an attack against plain hash functions.

  (71)A.plaintext

  B.ciphertext

  C.data

  D.hash

  (72)A.stream cipher

  B.hash function

  C.Message authentication code

  D.Block cipher

  (73)A.of

  B.for

  C.with

  D.in

  (74)A.hash

  B.stream

  C.ciphertext

  D.plaintext

  (75)A.collisons

  B.image

  C.preimage

  D.solution

      课课家教育专注软考培训10年以上,一直坚持自主研发,将丰富的软考培训经验有效融入教程研发过程,自成体系的软考视频教程软考培训教材软考在线题库,使考生的学习更具系统性,辅导更具针对性。想要报考2020年软考的考生现在就可以开始备考了,报名课课家软考各科目考试赠送:辅导教材、历年真题、考前冲剌资料、在线模拟测试题库、老师专属答疑指导等,以保障学员顺利通过考试。

  >>>>>>点击进入软考报名专题

 

      相关推荐:2019上半年信息安全工程师上午基础知识真题及答案解析

赞(10)
踩(0)
分享到:
华为认证网络工程师 HCIE直播课视频教程