刷题刷出新高度,偷偷领先!偷偷领先!偷偷领先! 关注我们,悄悄成为最优秀的自己!

单选题


Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The ( ) party uses the secret key as part of the mathematical operation to encrypt ( ) text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a ( ) key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital (_______) to be placed on messages. A digital signature uses the sender's private key to encrypt some portion of the message. When the message is received, the receiver uses the sender's () key tp decipher the digital signature to verify the sender's identity.

横线处应选( )。

A
interpretation
B
signatures
C
encryption
D
decryption
使用微信搜索喵呜刷题,轻松应对考试!

答案:

B

解析:

:题干描述了对称加密和公钥加密的基本原理及数字签名的应用。在描述公钥加密技术的部分提到,公钥加密技术允许在报文上放置数字签名,因此第一个空格应填写“signatures”。其他选项如“interpretation(解释)”、“encryption(加密)”、“decryption(解密)”都不符合语境。因此,答案是B。

创作类型:
原创

本文链接:Symmetric, or private-key, encryption is based on

版权声明:本站点所有文章除特别声明外,均采用 CC BY-NC-SA 4.0 许可协议。转载请注明文章出处。

让学习像火箭一样快速,微信扫码,获取考试解析、体验刷题服务,开启你的学习加速器!

分享考题
share