主观题

Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The(  )party uses the secret key as part of the mathematical operation to encrypt(  )text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a(  )key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital(  )to be placed on messages. A digital signature uses the sender’s private key to encrypt some portion of the message. When the message is received, the receiver uses the sender’s(  )key tp decipher the digital signature to verify the sender"s identity.
问题1
A.host
B.terminal
C.sending
D.receiving
问题2
A.plain
B.cipher
C.public
D.private
问题3
A.plain
B.cipher
C.public
D.private
问题4
A.interpretation
B.signatures
C.encryption
D.decryption
问题5
A.plain
B.cipher
C.public
D.private

查看答案
该试题由用户515****42提供 查看答案人数:14312 如遇到问题请 联系客服
正确答案
该试题由用户515****42提供 查看答案人数:14313 如遇到问题请联系客服

相关试题

换一换
热门试题
购买搜题卡 会员须知 | 联系客服
会员须知 | 联系客服
关注公众号,回复验证码
享30次免费查看答案
微信扫码关注 立即领取
恭喜获得奖励,快去免费查看答案吧~
去查看答案
全站题库适用,可用于E考试网网站及系列App

    只用于搜题看答案,不支持试卷、题库练习 ,下载APP还可体验拍照搜题和语音搜索

    支付方式

     

     

     
    首次登录享
    免费查看答案20
    微信扫码登录 账号登录 短信登录
    使用微信扫一扫登录
    登录成功
    首次登录已为您完成账号注册,
    可在【个人中心】修改密码或在登录时选择忘记密码
    账号登录默认密码:手机号后六位