刷题刷出新高度,偷偷领先!偷偷领先!偷偷领先! 关注我们,悄悄成为最优秀的自己!

单选题

Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The (_______) party uses the secret key as part of the mathematical operation to encrypt (    ) text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a (     ) key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital (    ) to be placed on messages. A digital signature uses the sender's private key to encrypt some portion of the message. When the message is received, the receiver uses the sender's (    ) key tp decipher the digital signature to verify the sender's identity.

横线处应选(   )。

A
host
B
terminal
C
sending
D
receiving
使用微信搜索喵呜刷题,轻松应对考试!

答案:

C

解析:

根据题目描述,对称加密或私钥加密中,发送方使用密钥将明文加密为密文,因此第一个空格应填“sending”。其他选项如“host”、“terminal”、“receiving”与题意不符。所以答案是C。

创作类型:
原创

本文链接:Symmetric, or private-key, encryption is based on

版权声明:本站点所有文章除特别声明外,均采用 CC BY-NC-SA 4.0 许可协议。转载请注明文章出处。

让学习像火箭一样快速,微信扫码,获取考试解析、体验刷题服务,开启你的学习加速器!

分享考题
share