用看的、听的学真题

study by eyes and ears.

  1. 首页
  2. 搜索结果
  3. 知识点列表(7)
  4. 第1页

【信息安全工程师202211】【4-8】

网络安全侧重于防护网络和信息化的基础设施,特别重视重要系统和设施、关键信息基础设施以及新产业、新业务和新模式的有序和安全。数据安全侧重于保障数据在开放、利用、流转等处理环节的安全以及个人信息隐私保护。网络安全与数据安全紧密相连,相辅相成。数据安全要实现数据资源异常访问行为分析,高度依赖网络安全日志的完整性。随着网络安全法和数据安全法的落地,数据安全已经进入法制化时代。

真题详情及解析

【信息安全工程师202011】【2-9】

阅读下列说明,回答问题1至问题8,将解答填入答题纸的对应栏内。

【说明】

密码学作为信息安全的关键技术,在信息安全领域有着广泛的应用。密码学中,根据加密和解密过程所采用密钥的特点可以将密码算法分为两类:对称密码算法和非对称密码算法。此外,密码技术还用于信息鉴别、数据完整性检验、数字签名等。

真题详情及解析

【信息安全工程师201611】【66】设在RSA的公钥密码体制中,公钥为(e,n)=(13,35),则私钥d=(66)

真题详情及解析

【信息安全工程师201611】【4】(4)不属于对称加密算法。

真题详情及解析

【信息安全工程师201705】【66】设在RSA的公钥密码体制中,用于为(e,n)=(7,55),则私钥d=(66)

真题详情及解析

【信息安全工程师201805】【65】设在RSA的公钥密码体制中,公钥为(e,n)=(7,55),则私钥d=(65)

真题详情及解析

【信息安全工程师202011】【71-75】Symmetric-key cryptosystems use the(71) key for encryption and decryption of a message,though a message or group of messages may have a different key than others. A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Each distinct pair of communicating parties must, ideally, share a different key, and perhaps each ciphertext exchanged as well. The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret. The difficulty of securely establishing a secret(72)between two communicating parties, when a secure channel doesn't already exist between them, also presents a chicken-and-egg problem which is a considerable practical obstacle for cryptography users in the real worl
Whitfield Difñie and Martin Hellman, authors of the first paper on public-key cryptography.
In a groundbreaking 1976 paper, Whitfield Diffie and Martin Hellman proposed the notion of public-key (also, more generally, called asymmetric key) cryptography in which two different but mathematically related keys are used-a public key and a private key. A public key system is so constructed that calculation of one key (the private key) is computationally infeasible(73)the other (the public key), even though they are necessarily relate Instead, both keys are generated secretly, as an interrelated pair. The historian David Kahn described public-key cryptography as “the most revolutionary new concept in the field since poly-alphabetic substitution emerged in the Renaissance”.
In public-key cryptosystems,the(74)key may be freely distributed,while its paired private key must remain secret. The public key is typically used for encryption, while the private or secret key is used for decryption. Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie-Hellman key exchange protocol.
In 1978, Ronald Rivest, Adi Shamir, and Len Adleman invented(75),another public-key system.
In 1997, it finally became publicly known that asymmetric key cryptography had been invented by James H. Ellis at GCHQ,a British intelligence organization, and that, in the early 1970s,both the Diffie-Hellman and RSA algorithms had been previously developed(by Malcolm J. Williamson and Clifford Cocks, respectively).

真题详情及解析
广告位