(广开)-信息安全与密码学-题库_第1页
(广开)-信息安全与密码学-题库_第2页
(广开)-信息安全与密码学-题库_第3页
(广开)-信息安全与密码学-题库_第4页
(广开)-信息安全与密码学-题库_第5页
已阅读5页,还剩44页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

(广开)-信息安全与密码学-题库【题目】AES中的()是指数据块从第1行开始循环左移的操作。【参考】***行移变换*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】以下不属于Hash函数应用的是()【参考】*********信息隐藏***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】MD5处理后将生成一个()位的散列值输出。【参考】128************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】数字签名可用于实现信息的()【参考】可用性***认证性***不可否认性******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】如果要破解MD5,现在黑客最常用的手段是()。【参考】***撞库分析*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】公开密钥算法要求必须要能承受得住选择明文攻击。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】可并行处理的分组密码工作模式有()【参考】ECB*********CTR***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】篡改的攻击形式是针对信息()的攻击。【参考】***完整性*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】在公钥密码体系中,公钥也是不能公开的。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】SHA-1中,针对一个分组为单位处理消息,算法核心是一个包含()个循环的模块。【参考】***4*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】三重DES的优点有()【参考】密钥长度增加***相对于DES增加了抗差分分析和线性分析的能力***升级成本少******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】在ECC公钥密码体制中,椭圆曲线确定后,可生成多个公私钥对为用户所用。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】分组密码的实现往往需要多轮迭代,每轮运算使用的密钥是相同的。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】数字签名方案往往是非确定性的,即同一人利用同一签名算法对同一消息进行多次签名所得的签名值是不相同的。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】SP网络结构中,()起到扩散作用。【参考】***P盒*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】栅栏密码是代换密码的一种。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】签名者无法知道所签消息的具体内容,即使后来签名者见到这个签名,也不能确定当时的签名行为,这种签名叫()【参考】*********盲签名***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】下列哪个算法属于公钥密码算法()【参考】*********RSA***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】现代密码体制要求加密算法不仅要经受住惟密文攻击,而且要承受得住已知明文攻击。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】以下属于单表代换密码的是()【参考】仿射密码***凯撒密码*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】下面哪种公钥密码体制针对同一密文可能有两个以上的对应的明文()【参考】***Rabin*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】()是指根据一定的规则重新排列明文,以打破明文的结构特性。【参考】***置换密码*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】Playfair代码是一种()密码。【参考】多表代换************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】密码学是保障信息安全的核心技术,信息安全是密码学研究和发展的目的。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】()年,Diffee和Hellman在其论文中提出了公钥密码的思想。【参考】*********1976***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】Alice收到Bob发给她的一个文件的签名,要验证这个签名的有效性,则需要使用()【参考】******Bob的公钥******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】以下哪个不属于AES不同于DES的地方【参考】*********AES没有非线性运算模块***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】以下哪个算法对输入信息所做的加密是可逆的()【参考】*********RSA***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】按目前的计算能力,RC4算法的密钥长度至少应为()才能保证安全强度。【参考】******128位******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】如果选择的两个素数为23和13,那么公钥可以选择()。【参考】*********79***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】能经受住已知明文攻击的密码体制必定能经受住选择明文攻击。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】DES中每一轮的子密钥运算包括()【参考】置换选择***循环左移*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】MD5算法的第一步是对信息进行(),使得信息被扩展至N*512+448,其中N为一个非负整数。【参考】填充************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】关于密码学的说法正确的是()【参考】1949年以前的密码学技术都不能称为学科***密码学的发展经历了传统密码学和现代密码学阶段***现代密码学阶段的起点是1949年香农的论文《保密系统的通信理论》***现代密码学的密码体制主要依靠现代计算机来实现***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】1949年,()发表题为《保密系统的通信理论》,标志着现代密码学的诞生。【参考】Shannon************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】密码分析的方法包括()【参考】穷举搜索***数学难题求解*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】置换密码是将明文中的字符替换为其他字符的密码体制。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】现有的计算能力下,RSA被认为是安全的最小密钥长度是()【参考】******1024位******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】一般来说,分组密码迭代轮数越多,密码分析越困难。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】传统密码学本质上均属于对称密码范畴。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】公钥密码体制的出现是密码学发展史上一次伟大的革命。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】线性反馈移位寄存器所产生的序列中,有些类如m序列具有良好的伪随机性,所以可直接作为密钥序列。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】如果在RSA算法中选择了素数23和29,则公钥应小于()【参考】******616******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】Pless触发器一共使用了()个由LFSR组成的J-K触发器。【参考】***4*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】在()年,美国国家标准局把IBM的Tuchman-Meyer方案确定数据加密标准,即DES。【参考】******1977******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】现在要破解MD5一般是从算法分析上进行。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】数字签名不能实现以下哪个安全目标()【参考】*********保密性***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】运用安全的哈希函数技术可实现口令的安全传输和存储。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】认证分为()【参考】实体认证***消息认证*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】()最早提出了概率信息的概念,从随机不确定性和概率的测度来诠释信息。【参考】***香农*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】DES算法要求在密钥参与下,对左右两个分组进行()轮相同轮函数的迭代。【参考】***16*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】消息认证码的作用包括验证信息来源的正确性和验证消息的完整性。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】选择合适的n级线性反馈函数,可以使序列的周期达到最大值,即()【参考】******2的n次方减去1******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】AES算法中的轮密钥加是将128位轮密钥同状态中的数据进行逐个二进制位的()【参考】******位异或******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】密码学在信息安全中的作用有()【参考】保护数据机密***保证信息完整性***保证信息认证性***保证信息的不可否认性***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】以下哪个不属于3DES的优点()【参考】*********处理速度快***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】公钥密码算法加解密速度非常快。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】差分分析是针对下面()密码算法的分析方法。【参考】DES************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】Bob如果要在发送文件给Alice时添加一个数字签名表明他的身份,则使用()来生成数字签名。【参考】Bob的私钥************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】()证明了一次一密体制是无条件安全的。【参考】香农************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】()俗称密码破译。【参考】******密码分析******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】现代密码系统的安全性应取决于密钥。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】数字签名的作用不包括()。【参考】*********防止信息被截获***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】被动攻击的目的是试图改变或影响系统的正常工作【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】扑克牌测试、游程测试等都是随机性的测试。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】以下哪些攻击方式属于主动攻击()【参考】中断***篡改***伪造***重放***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】()的攻击方法指的是攻击者不仅能选择不同的被加密的密文,还可以得到对应的明文。公开密钥算法必须经受住这种攻击。【参考】***选择密文攻击*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】密码体制的不同安全等级有【参考】全部破解***全盘推导***实例推导***信息推导***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】以下关于AES和DES的对比,正确的是()【参考】AES的加解密运算不一致***DES的加密器也可用于加密器***DES是面向比特的计算,而AES是面向字节的***AES的子密钥加对应于DES中S盒之前的子密钥异或***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】转子机中的每一个圆筒实际上定义了一个()。【参考】***单表代换*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】以下哪些属于密码编码学()【参考】对称密码体制***非对称密码体制*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】信息未经授权不能进行篡改,这保证了信息的完整性,下面那种方式可以实现对信息完整性的保护()【参考】***消息摘要*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】仿射密码的加密算法是一个线性变换,所有线性变换都能成为一个有效的仿射加密函数。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】使用计算机生成的随机数都是真随机数。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】基于Hash消息认证码的输出长度与消息长度无关。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】Camellia算法支持多种密钥长度。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】消息认证码MAC函数与加密函数的区别在于()【参考】***MAC函数不要求可逆性*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】以下属于被动攻击的是()【参考】***窃听***文件的非法复制******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】以下哪些是香农的论文【参考】通讯的数学原理***保密系统的通信理论***噪声下的通信***微分分析器的数学理论***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】密码学是对信息安全各方面的研究,能够解决所有信息安全的问题。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】在相同的安全强度下,ElGamal的安全密钥长度与RSA的安全密钥长度基本相同。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】序列密码的加解密密钥是由种子密钥生成的,而种子密钥的长度是由需加密的明文长度决定的。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】我国古代的藏头诗可看作是古典密码中的()密码。【参考】***置换*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】密钥管理技术依赖于()等基本密码技术来实现。【参考】加密***认证*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】密码学理论在近代密码中已成型。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】分组密码中,分组长度、密钥长度、密文长度都是一样长的。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】Hash函数都要使用密钥。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】电子现金系统的匿名性包括不可跟踪性和不可联系性,为实现这个目标,最有可能使用的签名方案是()【参考】***盲签名*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】安全的消息认证体制要求在自适应的选择消息攻击下,攻击者进行存在性伪造在计算上不可行。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】伪造的攻击是针对信息()的攻击。【参考】******认证性******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】哈希函数的安全性是指根据已知的哈希值不能推出相应的消息原文明文。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】网络安全的威胁有()【参考】伪装***非法连接***拒绝服务***非授权访问***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】()的攻击方法指的是攻击者不仅掌握了相当数量的密文,还有一些已知的明-密文对可供使用。对现代密码体制的基本要求,还包括能经受住此类攻击。【参考】*********已知明文攻击***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】以下哪些属于被动攻击()【参考】截取消息内容***通信量分析*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】Camellia算法可以支持的密钥长度不包括()【参考】*********64***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】签名者把其签名权授予某个人,这个人代表原始签名者进行签名,这种签名是()【参考】代理签名************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】网络威胁的原因可能是()【参考】程序漏洞***电磁辐射***网络管理漏洞***用户恶意***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】DES的一轮计算过程包括()【参考】扩展置换***循环左移***代换***轮密钥加***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】信息安全的要素包括【参考】机密性***完整性***可用性***可认证性***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】DES现已基本被AES取代,已没有什么参考和研究价值。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】古典密码的技术、思想及破译方法虽然相对简单,但它们反映了密码设计和破译的基本思想,对于理解、设计和分析现代密码仍然有借鉴价值。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】Feistel网络的优点在于()【参考】******加解密相似性******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】NTRU是一种基于多项式环的密码系统【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】把明文信息“attackatseven”以7×2的栅栏密码加密后,结果字符串为__________【参考】*********atcasvntaktee***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】下面()不是Hash函数具有的特性。【参考】***可逆性*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】在现代密码学发展史上,()是第一个广泛用于商用数据保密的密码算法。【参考】***DES*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】DES密码中所有的弱密钥、半弱密钥、四分之一弱密钥和八分之一弱密钥全部加起来,一共有()个安全性较差的密钥。【参考】*********256***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】以下哪个不是香农的论文()【参考】*********《NewDirectionsinCryptography》(密码学的新方向)***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】DES的安全问题有()【参考】密钥有互补性***存在弱密钥***密钥长度以现有计算能力来说已不足******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】RSA一般用于大数据量的消息的加密。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】()是指按一定的规律重新排列明文的顺序,但不改变明文本来的字符,只打破明文结构特性的一种加密方法。【参考】*********置换密码***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】RSA既可用于加密,也可用于数字签名。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】在现有的计算能力条件下,对于椭圆曲线密码算法,被认为是安全的最小密钥长度是()。【参考】***160位*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】Rabbit算法的输入为()比特密钥和()比特初始向量。【参考】128,64************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】变色龙签名是一种指定验证者的数字签名,其最鲜明的特点是其不可转让性。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】密码学的发展大致经历了传统密码学和现代密码学两个阶段。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】A5算法的初始密钥长度为()比特【参考】***64*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】以下关于伪随机数的说法,不正确的是()【参考】***伪随机数是没有规律、不可重复的*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】Geffe发生器使用了()个LFSR。【参考】******3******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】SHA1生成消息的哈希值长度是()位【参考】******160******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】截止2014年9月,下面哪个哈希函数还没有发现碰撞。【参考】*********SHA256***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】针对单表代换密码,可以通过统计分析的方法进行破解。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】在现有的计算能力条件下,对于非对称密码算法Elgamal,被认为是安全的最小密钥长度是()。【参考】*********1024位***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】以下哪个不是在RSA算法中涉及到的运算?【参考】******哈希函数******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】散列函数的安全性主要体现在其良好的单向性和对碰撞的有效避免。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】以下属于分组密码的是()【参考】IDEA***RC6***Skipjack***Camellia***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】RSA系统中,如果公钥是(11,221),则私钥是_____(提示:221=13×17)【参考】***35*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】通过统计字母频率并进行分析来破解密文,这种方法对以下哪种密码算法最有效。()【参考】***单表代换*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】密钥序列生成器使用非线性组合函数的目的是实现更长周期的密钥序列。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】序列密码的安全核心问题是如何将一小段的比特串(密钥)扩展成足够“长”的密钥。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】最常见的置换密码有列置换密码和周期置换密码等。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】MD5把数据分成每个()位的分组来处理输入信息。【参考】******512******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】以下关于主动攻击的说法正确的是()【参考】***主动攻击威胁数据的完整性、认证性和可用性***截取是主动攻击的典型方式***主动攻击涉及数据流的篡改或一个虚假信息流的产生***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】基于ElGamal的数字签名方案,其密钥生成算法与其加密方案是一样的。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】若破解一个密码系统是可行的,但使用已知的算法和现有计算工具不可能完成攻击所要求的工作量,则称该密码体制是()【参考】***计算上安全*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】数字签名算法不包括()。【参考】*********MD5***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】相对来说,()算法安全性能更高,计算量小,处理速度快,带宽要求低,存储空间占用小,特别适合在移动通信、无线设备上的使用。【参考】******ECC******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】SHA-1算法是以()位分组来处理信息的。【参考】*********512***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】RSA密码体制的安全性取决于其算法非常安全,无法被破解。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】近年找到了Hash函数的一些碰撞,因此可断定MD5、SHA1等Hash函数已被破解。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】随机数可以在认证时避免()攻击。【参考】*********重放***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】从理论上讲,穷举攻击可以破解任何密码系统,包括一次一密【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】Skipjack是一个密钥长度为()位分组加密算法。【参考】******80******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】下面哪种公钥密码体质是利用NP安全问题来设计公钥密码算法的()【参考】背包密码体制************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】对称加密算法也可用于实现数字签名。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】网络安全的威胁有()【参考】抵赖***信息泄露***篡改程序***篡改数据***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】()是一种概率公钥加密体制。【参考】***Goldwasser-Micali*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】hill密码能较好地抵抗统计分析法,对抗()的安全强度较高【参考】唯密文攻击************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】AES非常适合在受限空间环境中执行加密或解密操作。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】如果仅使用数字签名技术,下面哪些安全特性不能被满足()【参考】保密性************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】一个密码系统由以下哪些部分组成()【参考】明文***密文***加密及解密密钥***加密及解密算法***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】适合文件加密,而且有少量错误时不会造成同步失败,是软件加密的最好选择,这种分组密码的操作模式是指()。【参考】*********输出反馈模式***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】信息安全的认证性可通过以下哪些密码学技术来实现()【参考】消息认证码***数字签名*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】信息安全的目标包括()【参考】机密性***完整性***认证性***不可抵赖性***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】针对电子文件或版权保护,防止滥用或盗版,最有可能使用的数字签名是()【参考】*********不可否认签名***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】SHA系列算法有多个,其输出的散列值长度不相同,其散列值越长,其安全性就越高。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】Hash函数是一对多的映射。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】使用凯撒密码加密明文,每个字母用他之后的第3个字母替代,则密文khoor解密后的明文是()。【参考】*********hello***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】分组长度是128比特的分组密码有()【参考】AES***RC6******Camellia***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】在分组密码算法中,如果分组长度过短,那么攻击者可利用()来破解。【参考】唯密文攻击************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】在计算机网络中,如果某公司的n个职员想了解他们的平均薪水,又不想让其他任何人知道自己的薪水,则最有可能用到()【参考】******安全多方计算******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】转轮密码是近代密码史中非常有代表性的一种密码算法,其设计思想与下面哪种密码相似()【参考】******维吉尼亚密码******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】Skipjack算法的轮数是()。【参考】******32******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】如果重复使用这种密码体制可以增加密码的安全强度,则这种密码体制是()的。【参考】******迭代******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】SHA256和SHA512输入消息的最大长度是相同的。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】惟密文攻击一般采用穷举搜索法。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】截取的攻击形式是针对信息()的攻击。【参考】机密性************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】生日攻击是针对()密码算法的分析方法。【参考】*********MD5***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】如果选择的两个素数为11和13,那么选择的公钥应满足()。【参考】******小于120且与之互质******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】现在使用最广泛的公开密钥密码体制是()【参考】RSA************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】若Alice想向Bob分发一个会话密钥,采用公钥加密算法,那么Alice应该选用的密钥是()。【参考】******Bob的公钥******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】我国古代的藏头诗、藏尾诗实际上采用的是移位密码的方法。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】设仿射函数是y=11x+6(mod26),则明文so加密的结果是()【参考】*********we***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】()可保证消息的完整性。【参考】***Hash函数*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】具有抗强碰撞的哈希函数一定具有弱碰撞。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】MD5、SHA1、SHA256这三个算法所输出的哈希值长度都是不同的,而且他们的分组长度也不同。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】RSA公钥密码体制中,素数p和q确定后,可生成多个公私钥对为用户所用。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】以下关于隐写术的说法,正确的是()【参考】藏头诗是一种隐写术***隐写术也是一种信息保密技术***隐写术到数字通信时代演变成一些信息隐藏技术,如水印、微缩技术等******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】密钥长度为128的AES,其加密轮数是()【参考】10************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】分组密码的工作模式有()【参考】ECB***CBC***CFB***OFB***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】三重DES的模式有()【参考】DES-EEE3***DES-EDE3***DES-EEE2***DES-EDE2***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】如果一个数字签名体制能在()攻击下,攻击者进行存在性伪造在计算上也不可行,则签名体制是安全的。【参考】*********自适应的选择消息攻击***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】以下哪种不是三重DES的模式【参考】*********DES-EEE2***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】下面哪种签名最不可能具有匿名性()【参考】******多重签名******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】以下哪些是香农提出的()【参考】***信息论***通信系统的模型******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】信息安全的保密性可通过以下哪些密码学技术来实现()【参考】******非对称加密***对称加密***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】隐写术指的是使用一整段信息中的子集来表达隐含的消息。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】分组密码主要解决信息安全存在的()问题。【参考】保密性************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】SP网络结构中,()起到混乱作用。【参考】S盒************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】公钥密码的思想给密码学的发展带来质的飞跃。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】()特性是指在加密变换过程中明文、密钥及密文之间的关系尽可能复杂,以防密码破译者采用统计分析法进行破译攻击。【参考】***混乱*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】在DES算法中,如果给定初始密钥K,经子密钥产生的各个子密钥都相同,则称该密钥K为弱密钥,DES算法弱密钥的个数为()【参考】***4*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】MD5和SHA1的消息分组长度均为()比特。【参考】***512*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】现代密码体制要求要能承受哪些攻击()【参考】惟密文攻击***已知明文攻击*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】多重DES使得密钥长度增加,同时分组长度也会发生相应改变。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】分组密码主要使用的迭代结构有()【参考】Feistal网络***SP网络结构*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】以下关于RSA算法的说法不正确的是()【参考】RSA常用于大量数据加密************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】以下关于被动攻击和主动攻击的说法正确的是()【参考】主动攻击涉及数据流的篡改或一个虚假信息流的产生***被动攻击威胁数据的机密性***主动攻击威胁数据的完整性、认证性和可用性***被动攻击表现出与主动攻击相反的特点***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】以下属于古典密码算法的是()【参考】仿射密码***凯撒密码***置换密码***维吉尼亚密码***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】统计分析法容易破解以下哪些加密算法()【参考】凯撒密码***仿射密码*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】信息安全的可用性可通过以下哪些密码学技术来实现()【参考】消息认证码***数字签名***Hash函数***对称加密***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】在Playfair密码的代换中,()两个字母看作一个字符,放在同一个位置。【参考】******i和j******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】在AES中,分组长度和密钥长度均能被独立指定为128位,192位,256位。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】使用Hash函数和数字签名技术不能实现下面那个目标()【参考】机密性************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】1988年,()首次给出了数字签名体制的粗略安全需求。【参考】Goldwasser***Micali***Rivest******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】当前分组的输入与上一分组相关的分组密码工作模式有()【参考】***CBC******CFB***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】姚启智先生于1982年提出的百万富翁问题引出了()理论【参考】******安全多方计算******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】在一个RSA公钥密码系统中,若p=13,q=17,选择公钥e=11,若要传输的明文为2,则加密后的密文是()【参考】***2的11次方mod221*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】以下哪个不属于Hash函数()【参考】*********AES***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】篡改是针对连接的协议数据单元的()的攻击。【参考】真实性***完整性***有序性******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】以下哪种算法加密和解密的密钥不相同?【参考】***ECC*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】设明文分组序列X1…Xn产生的密文分组序列为Y1…Yn。假设一个密文分组Y1在传输是出现了错误(即某些1变成了0,或者相反)。不能正确解密的明文分组数目在应用()模式时为1.【参考】电子密码本模式和输出反馈模式************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】DES的分组长度是()【参考】***64*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】公开密钥算法必须能经受住()【参考】惟密文攻击***已知明文攻击******选择密文攻击***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】和DES类似,AES也存在弱密钥。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】一个生成多项式是本原多项式的n级的LFSR的输出序列在重复之前最多能产生多少位长的伪随机序列?【参考】*********2的n次方减1***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】()指攻击者仅知道签名者的公钥所发起的攻击。【参考】唯密钥攻击************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】待加密的明文是cyber,若使用Hill密码加密,密钥为k=[1051200314210089110000037](5×5矩阵)则密文为_________【参考】******wrtrv******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】使用维吉尼亚密码加密的明文是“sorcery”,密钥为“iscbupt”,则密文为________【参考】agtdygr************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】ECC密码体制的安全性主要依赖于()【参考】******椭圆曲线上离线对数问题的难度******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】利用反馈移位寄存器来生成密钥序列的过程中,反馈移位寄存器的初始值是由种子密钥决定的。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】消息中的任何一位或多位的变化都将导致Hash函数的散列值发生变化,因此可以为消息提供()。【参考】错误检测************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】计算消息认证码MAC所进行的运算是()【参考】******散列******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】根据密码分析者所掌握的分析资料的不同,密码分析可分为:惟密文攻击、已知明文攻击、选择明文攻击、选择密文攻击,其中破译难度最大的是()【参考】惟密文攻击************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】密钥长度为256的AES,其加密轮数是()【参考】******14******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】对签名体制的攻击中,()指的是攻击者获得了签名者的私钥。【参考】完全摧毁************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】促使公钥密码出现的主要原因是密码学家的智慧。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】希尔密码抵御唯密文攻击的能力很强,但对于已知明文攻击,抵御能力很差。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】分组密码的()原则是指所设计的密码应使得密钥的每一位数字影响密文的许多位数字以防止对密钥进行逐段破译。【参考】***扩散原则*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】现代密码学的技术中,()技术跟密钥无关【参考】******哈希函数******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】序列密码是属于对称密码体制。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】以下属于分组密码的是()【参考】***Camellia***RC6***Skipjack***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】()是Hash函数的一种重要应用。【参考】******数字签名******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】公钥加密体制中的公钥用于加密计算,私钥用于解密计算。【参考】正确************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】()的出现标志着加解密操作从手工到机械。【参考】******转轮密码机******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】数字签名中,签名值的长度与被签名消息的长度有关【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】以下关于被动攻击的说法,正确的是()【参考】被动攻击不干扰信息流***被动攻击只威胁数据的机密性***典型的被动攻击形式是截取******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】使用LFSR生成的随机序列可以直接使用。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】在一个RSA公钥密码系统中,若p=13,q=17,若选择公钥e,对应的私钥为d,若密文为m,则解密的操作是()【参考】***m的d次方mod221*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】J-K触发器使用了()个LFSR。【参考】***2*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】()是指每1比特明文的变化尽可能影响到输出密文序列的比特,以便隐藏明文的统计特性。【参考】***扩散*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】认证系统模型的参与者可能包括()【参考】消息发送者***消息接收者***攻击者***仲裁者***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】ElGamal解密过程需要()各一次。【参考】******模指数运算、求逆运算和模乘积运算******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】在广域网上,两用户实现电子合同的签署,最有可能使用的签名是()【参考】*********同时生效签名***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】盲签名在实际中几乎没用。【参考】***错误*********+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】()指的是把消息明文转换为密文的过程。【参考】加密************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】Playfair密码实际上是一种()【参考】*********多表代换***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】分组密码的设计原则有()【参考】扩散***混乱***迭代******+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】安全的消息认证体制,要求在()下,攻击者进行存在性伪造是计算不可行的。【参考】*********自适应的选择消息攻击***+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】一个Geffee发生器的周期是()【参考】所有LFSR的周期的最小公倍数************+++++++++++++++++++++++++++++++++++++++++++++++++++++【题目】分组密码设计的混乱原则是指所设计的密码应使得密钥和明文以及密

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论