题目
4520_COMP_SCI_X_0006 Quiz 2
单项选择题
Alice and Bob use asymmetric encryption to communicate. How many keys does Alice and Bob have combined?
选项
A.2
B.4
C.3
D.1
查看解析
标准答案
Please login to view
思路分析
We start by clarifying the scenario: Alice and Bob are using asymmetric (public-key) encryption. In such a system, each participant typically has two keys: a public key (which can be shared openly) and a private key (which remains secret).
Option A: 2
This would imply that together they hold only two keys in total. If each person has a pair of key......Login to view full explanation登录即可查看完整答案
我们收录了全球超50000道考试原题与详细解析,现在登录,立即获得答案。
类似问题
Foo wants to send a confidential message to Yeh Lih over an insecure network. Which cryptographic technique should Foo use?
Which cryptographic algorithm is widely used in PKI encryption?
Blank ______ key encryption uses two keys: a public key that everyone can have and a private key for only the recipient.
(CISA exam, adapted) To ensure confidentiality in an asymmetric-key encryption system, knowledge of which of the following keys is required to decrypt the received message?
更多留学生实用工具
希望你的学习变得更简单
加入我们,立即解锁 海量真题 与 独家解析,让复习快人一步!