题目
202580-ITIS-4221-001:ITIS-5221-001-XLSDO202580_Combined Midterm Exam Practice
单项选择题
Alice and Bob are strangers. Alice wants Bob to send her a private message A and be able to verify the integrity of the message. What should Bob do? (h() is a hash function and assume both Alice and Bob knows h()). Bob generates an encryption key k and relies on PKI to send Alice X, Y, H where Y=PubE(bob-pri,k), X=SymE(k,A), H=PubE(alice-pub, h(A)).
选项
A.This does not work because this message can be read by anyone.
B.This does not work because Alice cannot have access to the encryption key k
C.This does not work because Alice cannot verify Bob's public key
D.This works.
查看解析
标准答案
Please login to view
思路分析
Consider the scenario and what each component is intended to do in Alice–Bob public-key infrastructure.
Option 1: 'This does not work because this message can be read by anyone.' This claim focuses on readability by third parties, but the real problem here is not whether the message is readable in general; it’s whether Alice can obtain the plaintext and verify integrity. Since X is symmetrically encrypted with k, and Y is a signature-like......Login to view full explanation登录即可查看完整答案
我们收录了全球超50000道考试原题与详细解析,现在登录,立即获得答案。
类似问题
What uses two keys: a public key that everyone can have and a private key for only the recipient?
A typical disadvantage of public key encryption compared to symmetric key encryption is ________.
When is the private key of a public/private key pair used in bidirectional encrypted communications? (Select the best answer.)
In a consumer society, many adults channel creativity into buying things
更多留学生实用工具
希望你的学习变得更简单
加入我们,立即解锁 海量真题 与 独家解析,让复习快人一步!