题目
Introduction to Security and Forensic Technologies (CT046-3-1-ISFT-25-RESIT)
单项选择题
Which cryptographic algorithm is widely used in PKI encryption?
选项
A.a. RSA (Rivest-Shamir-Adleman)
B.b. SHA-256 (Secure Hash Algorithm 256-bit)
C.c. AES (Advanced Encryption Standard)
D.d. SHA-512 (Secure Hash Algorithm 512-bit)

查看解析
标准答案
Please login to view
思路分析
To begin, let’s identify what PKI encryption typically relies on. PKI (Public Key Infrastructure) primarily uses public-key cryptography to enable secure key exchange, digital signatures, and certificate-based authentication.
Option a: a. RSA (Rivest-Shamir-Adleman). This is the classic public-key algorithm widely......Login to view full explanation登录即可查看完整答案
我们收录了全球超50000道考试原题与详细解析,现在登录,立即获得答案。
类似问题
Foo wants to send a confidential message to Yeh Lih over an insecure network. Which cryptographic technique should Foo use?
Blank ______ key encryption uses two keys: a public key that everyone can have and a private key for only the recipient.
(CISA exam, adapted) To ensure confidentiality in an asymmetric-key encryption system, knowledge of which of the following keys is required to decrypt the received message?
Suppose Alice encrypted a message using Bob's public key and sent it to Bob. If an attacker was able to intercept Alice-Bob message, which of the following can be compromised:
更多留学生实用工具
希望你的学习变得更简单
加入我们,立即解锁 海量真题 与 独家解析,让复习快人一步!