All three types of cryptography schemes have unique function mapping to specific applications.For example,the symmetric key(1)ap

admin2017-11-28  27

问题 All three types of cryptography schemes have unique function mapping to specific applications.For example,the symmetric key(1)approach is typically used for the encryption of data providing(2),whereas asymmetric key cryptography is mainly used in key(3)and nonrepudiation,thereby providing confidentiality and authentication.The hash(4)(noncryptic),on the other hand,does not provide confidentiality but provides message integrity,and cryptographic hash algorithms provide message (5)and identity of peers during transport over insecure channels.
(5)

选项 A、confidentiality
B、integrity
C、service
D、robustness

答案B

解析 所有三种加密方案都以其独特的功能对应于具体的应用。例如,对称密钥加密方案通常用于保密数据的加密,而非对称加密主要用于密钥交换和非否认验证,从而提供了保密性和认证机制。另一方面,哈希算法(非加密的)不能提供保密性,但可以提供报文完整性检测,而加密的哈希算法还可以提供报文完整性和对等方的标识验证,这在通过不安全信道传输的过程中是有用的。
转载请注明原文地址:https://jikaoti.com/ti/nQn7FFFM
0

相关试题推荐
最新回复(0)