看板 TransCSI 關於我們 聯絡資訊
重新排版一下…Orz ※ 引述《wakke (衝阿 去掉C)》之銘言: 列舉兩題 43. When using public key encryption scheme, how to let A securely transmit a message to B, and let B believe that the message is indeed sent by A? (A) use A’s public key to encrypt the message, and then use B’s private key to encrypt the previous encrypted message (B) use A’s private key to encrypt the message, and then use B’s public key to encrypt the previous encrypted message (C) use B’s public key to encrypt the message, and then use A’s private key to encrypt the previous encrypted message (D) use B’s private key to encrypt the message, and then use A’s public key to encrypt the previous encrypted message (E) none of the above 31. Which of the following is wrong? (A) public key encryption is also called asymmetric key encryption because the encryption and decryption use different keys (B) private key encryption is also called symmetric key encryption because the encryption and decryption use the same keys (C) public key encryption scheme can be used for digital signature (D) PGP is used to secure email messages (E) all of the above are correct -- 歡迎大家一起加入Intel Philanthropic Peer-to-Peer Program !!! 這項「英特爾慈善『點對點連線』計畫」旨在經由網際網路,把數百萬部個人電腦連結 起來,加速研發治療白血球過多症血癌)的藥物,從而把新藥上市的需要時間縮短約 一半。對本計畫有興趣者,可以到http://www.grid.org/download/gold/download.htm 網站,下載該程式。 一旦一批資料處理完畢,下次電腦連接上網際網路時,不論經由寬頻撥接,電腦便會 -- ※ 發信站: 批踢踢實業坊(ptt.cc) ◆ From: 140.115.201.17