女人久久久www免费人成看片,国内自拍偷拍网,国产一区二区三区免费在线观看,欧美精品三区四区,91久久国产综合久久91,欧美成人精品第一区二区三区 ,美女成人在线观看

軟題庫(kù) 移動(dòng)APP 掃碼下載APP 隨時(shí)隨地移動(dòng)學(xué)習(xí) 培訓(xùn)課程
試卷年份2015年下半年
試題題型【單選題】
試題內(nèi)容

Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The (1) party uses the secret key as part of the mathematical operation to encrypt (2) text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a (3) key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital (4) to be placed on messages. A digital signature uses the sender's private key to encrypt some portion of the message. When the message is received, the receiver uses the sender's (5) key tp decipher the digital signature to verify the sender's identity.
(1)A.host
B.terminal
C.sending
D.receiving
(2)A.plain
B.cipher
C.public
D.private
(3)A.plain
B.cipher
C.public
D.private
(4)A.interpretation
B.signatures
C.encryption
D.decryption
(5)A.plain
B.cipher
C.public
D.private


相關(guān)試題

推薦文章