当前位置: 答题翼 > 问答 > 计算机类考试 > 正文
目录: 标题| 题干| 答案| 搜索| 相关
问题

Symmetric, or private-key, encryption is based on a secret key that is shared by both comm


Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The () party uses the secret key as part of the mathematical operation to encrypt () text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a () key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital () to be placed on messages. A digital signature uses the sender&39;s private key to encrypt some portion of the message. When the message is received, the receiver uses the sender&39;s () key tp decipher the digital signature to verify the sender&39;s identity.

A.host B.terminal C.sending D.receiving A.plain B.cipher C.public D.private A.plain B.cipher C.public D.private A.interpretation B.signatures C.encryption D.decryption A.plain B.cipher C.public D.private

请帮忙给出正确答案和分析,谢谢!

参考答案
您可能感兴趣的试题
  • 在发放U-key时,柜员通过绑定操作实现U-key与该客户的一一对应,即客户、证书、U-key三者实现相互

  • Where can people take adult education courses?A.In a private college or university.B.At ho

  • What is the key to deciding on whether you should quit or not?A.How bad the co-workers are

  • PKI是()。A.Private Key InfrastructureB.Public Key InstituteC.Public Key InfrastructureD.

  • Ever spent half an hour looking for your car keys? Or walked into a room only to wonder wh

  • 下列程序段,运行后窗体上输出结果是 Private Sub Commnad1_Click() a=5∶b=4∶c=3∶d=2 x=3>2*b Or