Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The (1) party uses the secret key as part of the mathematical operation to encrypt (2) text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a (3) key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital (4) to be placed on messages. A digital signature uses the sender's private key to encrypt some portion of the message. When the message is received, the receiver uses the sender's (5) key tp decipher the digital signature to verify the sender's identity.
(1)A.host
B.terminal
C.sending
D.receiving
(2)A.plain
B.cipher
C.public
D.private
(3)A.plain
B.cipher
C.public
D.private
(4)A.interpretation
B.signatures
C.encryption
D.decryption
(5)A.plain
B.cipher
C.public
D.private
10年專(zhuān)注信管,信管教育專(zhuān)注者,信管網(wǎng)優(yōu)勢(shì)
免費(fèi)試聽(tīng)信管網(wǎng)信息系統(tǒng)項(xiàng)目管理師課程
全國(guó)前50名高分學(xué)員訪(fǎng)談:董麗(174)、李思...
信息系統(tǒng)項(xiàng)目管理師培訓(xùn)課程(高端班)
信管、集成、系規(guī)、安全,專(zhuān)業(yè)成就夢(mèng)想
中級(jí)系統(tǒng)集成項(xiàng)目管理工程師培訓(xùn)課程
系統(tǒng)規(guī)劃與管理師培訓(xùn)課程(自有資料+直播)
軟題庫(kù):軟考在線(xiàn)題庫(kù)、支持手機(jī)答題