题目
202580-ITIS-6200-051:ITIS-6200-081:ITIS-8200-051-XLSDX202580_Combined Quiz 5
单项选择题
Suppose Alice encrypted a message using Bob's public key and sent it to Bob. If an attacker was able to intercept Alice-Bob message, which of the following can be compromised:
选项
A.Confidentiality
B.Integrity
C.Both confidentiality and integrity
D.Neither confidentiality nor integrity can be compromised
查看解析
标准答案
Please login to view
思路分析
When considering encryption with Bob's public key, the core idea is that only Bob, possessing his private key, can decrypt what Alice sent.
Option 1: Confidentiality. Since the attacker only intercepted the ciphertext and does not have Bob's private key, they should not be able to recover the plaintext. Therefore, confid......Login to view full explanation登录即可查看完整答案
我们收录了全球超50000道考试原题与详细解析,现在登录,立即获得答案。
类似问题
Foo wants to send a confidential message to Yeh Lih over an insecure network. Which cryptographic technique should Foo use?
Which cryptographic algorithm is widely used in PKI encryption?
Blank ______ key encryption uses two keys: a public key that everyone can have and a private key for only the recipient.
(CISA exam, adapted) To ensure confidentiality in an asymmetric-key encryption system, knowledge of which of the following keys is required to decrypt the received message?
更多留学生实用工具
希望你的学习变得更简单
加入我们,立即解锁 海量真题 与 独家解析,让复习快人一步!