刷题刷出新高度,偷偷领先!偷偷领先!偷偷领先! 关注我们,悄悄成为最优秀的自己!

单选题

Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The (   ) party uses the secret key as part of the mathematical operation to encrypt (_____) text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a (   ) key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital (   ) to be placed on messages. A digital signature uses the sender's private key to encrypt some portion of the message. When the message is received, the receiver uses the sender's (   ) key tp decipher the digital signature to verify the sender's identity.

横线处应选(  ).

A
plain
B
cipher
C
public
D
private
使用微信搜索喵呜刷题,轻松应对考试!

答案:

A

解析:

第一空需要填入的词应该与“加密”操作有关,而明文(plain text)是加密操作的对象,因此应该选A。其他空后面的解释已经给出了正确的答案和解析。

创作类型:
原创

本文链接:Symmetric, or private-key, encryption is based on

版权声明:本站点所有文章除特别声明外,均采用 CC BY-NC-SA 4.0 许可协议。转载请注明文章出处。

让学习像火箭一样快速,微信扫码,获取考试解析、体验刷题服务,开启你的学习加速器!

分享考题
share