用看的、听的学真题

study by eyes and ears.

  1. 首页
  2. 信息安全工程师
  3. 第3章 密码学基本理论
  4. 真题列表

第3章 密码学基本理论

【6】一个密码系统如果用E表示加密运算,D表示解密运算,M表示明文,C表示密文,则下面描述必然成立的是(6)

真题详情及解析

【53】密码分析的目的是(53)

真题详情及解析

【29】以下关于加密技术的叙述中,错误的是(29)

真题详情及解析

【32】密码分析学是研究密码破译的科学,在密码分析过程中,破译密文的关键是(32)

真题详情及解析

【50】网络系统中针对海量数据的加密,通常不采用(50)方式。

真题详情及解析

【71-75】(71)is the science of hiding information. Whereas the goal of cryptography is to make data unreadable by a third party,the goal of steganography is to hide the data from a third party. In this article,I will discuss what steganographyis,what purposes it serves,and will provide an example using available software.
There are a large number of steganographic (72)that most of us are familiar with (especially if you watch alot of spy movies!),ranging from invisible ink and microdots to secreting a hidden message in the second letter of each word of a large body of text and spread spectrum radio communication. With computers and networks,there are many other ways of hiding information,such as:
Covert channels(e.g.,Loki and some distributed denial-of-service tools use the Internet Control (73)Protocol,or ICMP,as the communications channel between the “bad guy” and a compromised system)
Hidden text within Web pages
Hiding files in “plain sight”(e.g.,what better place to “hide” a file than with an important sounding name in the c:\winnt\system32 directory?)
Null ciphers(e.g.,using the first letter of each word to form a hidden message in an otherwise innocuous text)
Steganography today,however,is significantly more (74)than the examples above suggest allowing a user to hide large amounts of information within image and audio files. These forms of steganography often are used in conjunction with cryptography so that the information is doubly protected; first it is encrypted and then hidden so that an adversary has to first find the information(an often difficult task in and of itself)and then decrypt it.
The simplest approach to hiding data within an image file is called (75)significant bit insertion.In this method,we can take the binary representation of the hidden data and overwrite the bit of each byte within the cover image.If we are using 24-bit color,the amount of change will be mininmal and indiscerible to the human eye.

真题详情及解析

【6】密码学根据研究内容可以分为密码编制学和密码分析学。研究密码编制的科学称为密码编制学,研究密码破译的科学称为密码分析学。密码分析学中,根据密码分析者可利用的数据资源,可将攻击密码的类型分为四类,其中适于攻击计算机文件系统和数据库系统的是(6)

真题详情及解析

【65】一个密码系统至少由明文、密文、加密算法、解密算法和密钥五个部分组成,而其安全性是由(65)决定的。

真题详情及解析

【6】研究密码破译的科学称为密码分析学。密码分析学中,根据密码分析者可利用的数据资源,可将攻击密码的类型分为四种,其中适于攻击公开密钥密码体制,特别是攻击其数字签名的是(6)

真题详情及解析

【1】根据密码分析者可利用的数据资源来分类,可将密码攻击的类型分为四类,其中密码分析者能够选择密文并获得相应明文的攻击密码的类型属于(1)

真题详情及解析
培训报名