- 1、本文档共14页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
(网络安全)((Network Security))
(网络安全)((Network Security))
Network engineer exercises eight
Explain:
This exercise is mainly about the basic concepts and basic knowledge of the seventh chapter and the eighth chapter. In order to further understand the contents of each chapter, pick up the drain filled, especially to some basic knowledge points of each chapter in the Department of integrated exercises, and hope that through the exercises would make up problems in practice omission and more comprehensive understanding of network knowledge.
Seventh chapters
The 7.1 section of this chapter is the interpretation of some nouns and the most basic concepts. This section is not usually a direct question, but these nouns and concepts are involved in the questions. No more questions here, I hope you will take a good look.
In the DES encryption algorithm, the output of the function f is (1) bits. DES algorithm is block cipher, and the length of data packet is (2) bits. Using software methods to implement DES is generally at least 100 times faster than RSA. DES produces ciphertext through (3) methods.
1.A.8 B.16 C.32 D.64
2.A.8 B.16 C.32 D.64
3.A. cumulative B. iteration, C. logic, and D. XOR
Reminder: review the DES, IDES, MD5, SHA input data length, output length and other data, should be remembered before the exam.
What methods (algorithms) do you use or what principles do you use to implement encryption?.
RSA belongs to (4) encryption method. A well-known application of RSA is used in (5).
4.A. asymmetric B. symmetric C. stream cipher D. key
5.A. public key encryption, B.SSL C., private key encryption, D. symmetric encryption
Reminder: the characteristics of traditional cryptography, public key cryptography system features, want candidates to take a look at their own.
? in order to prevent active attacks, the data sender will produce variable length message of fixed length message after message digest calculation in the transmitter, then the message digest is encrypted, sent with encrypted message digest a
您可能关注的文档
- %国外生活必备的英文词汇-饮食%(Foreign essential English Vocabulary - diet%).doc
- (all鸣)小鸣争夺战((all Ming) Xiaoming battle).doc
- (免费)值得一看_高数考研150谈经验((free of charge) is worth a look _ high number of PubMed 150 to talk about the experience).doc
- (转载)健康的真正内涵((Reprint) the true meaning of health).doc
- (持续添加修正)各地名店名厨多款流行火锅蘸料、味碟配方经典总汇(麻酱、沙茶、海鲜、香辣、肥牛等)((continue to add a variety of popular famous chefs around the Amendment) Hot pot Zhanliao, Weidie classical formula (sesame, barbecue, seafood confluence, s.doc
- (pmu专稿)项目经理在电子政务建设中遭遇的种种困境((PMU) project managers encountered various difficulties in the construction of E-government).doc
- (第1章) 单片机教案((first chapter) SCM lesson plan).doc
- + 有用的第7章_风湿病、痛风及骨科疾病(The seventh chapter _ + useful for rheumatism, gout and Department of orthopedics disease).doc
- + 有用的执医考试(Useful medical examination).doc
- +有用 的第6章_血液系统疾病用药(The sixth chapter _ + useful treatment of blood system diseases).doc
文档评论(0)