全部科目 > 网络规划设计师 >
2015年下半年 上午试卷 综合知识
第 72 题
章/节 专业英语  
 
 
Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The (71) party uses the secret key as part of the mathematical operation to encrypt (72) text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a (73) key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key is used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital (74) to be placed on messages. A digital signature uses the sender's private key to encrypt some portion of the message. When the message is received, the receiver uses the sender's (75) key to decipher the digital signature to verify the sender's identity.
 
  A.  plain
 
  B.  cipher
 
  C.  public
 
  D.  private
 
 




 
 
相关试题     专业英语 

  第73题    2011年下半年  
A glue that holds the whole Internet together is the network layer protocol, (71) . Unlike most older network layer protocols, it was designed from the beginning with internetworki..

  第75题    2019年下半年  
IPsec,also known as the internet Protocol(71),defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP l..

  第73题    2014年下半年  
There are two general approaches to attacking a ( 71)encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus per..




更多复习资料
请登录电脑版软考在线 www.rkpass.cn

京B2-20210865 | 京ICP备2020040059号-5
京公网安备 11010502032051号 | 营业执照
 Copyright ©2000-2023 All Rights Reserved
软考在线版权所有