首页
登录
从业资格
All three types of cryptography schemes
All three types of cryptography schemes
admin
2022-08-02
99
问题
All three types of cryptography schemes have unique function mapping to specific.For example, the symmetric key approach ( ) is typically used for the encryption of data providing( ), whereas asymmetric key cryptography is maidy used in key( )and nonrepudiation, thereby providing confidentiality and authentication. The hash( )(noncryptic), on the other hand, does not provide confidentiality but provides message integrity, and cryptographic hash algorithms provide message( 本题 )and identity of peers during transport over insecure channels.A.Confidentiality B.integrity C.service D.robustness
选项
答案
B
解析
转载请注明原文地址:https://www.tihaiku.com/congyezige/2405220.html
本试题收录于:
中级 网络工程师题库软件水平考试初中高级分类
中级 网络工程师
软件水平考试初中高级
相关试题推荐
Allthreetypesofcryptographyschemes
Allthreetypesofcryptographyschemes
Allthreetypesofcryptographyschemes
Allthreetypesofcryptographyschemes
Allthreetypesofcryptographyschemes
Allthreetypesofcryptographyschemes
Allthreetypesofcryptographyschemes
Allthreetypesofcryptographyschemes
Allthreetypesofcryptographyschemes
Allthreetypesofcryptographyschemes
随机试题
Whichofthefollowingcanbestdescribehissituation?[br][originaltext]Hew
Whenyoulookup,howfarbackintimedoyousee?Oursenses
TheAdventureofHuckleberryFinnwaswrittenby______A、HenryJames.B、HarrietB
PASSAGEFOURTheSpaceNeedle.从第一段中的MostvisitorscometotheCenterforSeattle’
根据以下材料,回答48-51题 AlanLakein,atimeman
手、臂或身体其他部分撑在器械上的姿势称为()。A.转体 B.倾 C.回环
证券交易所是实行自律管理的自然人。()
扣缴义务人应当自税收法律、行政法规规定的扣缴义务发生之日起()日内,按照所
以下有关工资管理模块的描述中,不正确的是()。A.自动生成的记账凭证在总账可以
某电信工程公司承担了200个3G移动基站的安装工程,内容包括传输设备、电源设备、
最新回复
(
0
)