●There are two general approaches to attacking a __(71)__encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the __(72)__ or even some sample plaintext-ciphertext pairs.This type of __(73)__ exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.If the attack succeeds in deducing the key,the effect is catastrophic:All future and past messages encrypted with that key are compromised.The second method,known as the __(74)__-force attack,is to try every possible key on a piece of __(75)__ until an intelligible translation into plaintext is obtained.On average,half of all possible keys must be tried to achieve success.
(71)A.stream
B.symmetric
C.asymmetric
D.advanced
(72)A.operation
B.publication
C.plaintext
D.ciphertext
(73)A.message
B.knowledge
C.algorithm
D.attack
(74)A.brute
B.perfect
C.atribue
D.re search
(75)A.plaintext
B.ciphertext
C.sample
D.code
各省软考办 | ||||||||||