In the DH key exchange process, the session key is never passed across the network.
In the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.
In the DH key exchange process, the session key is passed across the network to the peer for confirmation.
In the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security
第1题:
Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The ( ) party uses the secret key as part of the mathematical operation to encrypt ( ) text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a ( ) key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital ( ) to be placed on messages. A digital signature uses the sender&39;s private key to encrypt some portion of the message. When the message is received, the receiver uses the sender&39;s ( ) key tp decipher the digital signature to verify the sender&39;s identity.
A.host B.terminal C.sending D.receiving A.plain B.cipher C.public D.private A.plain B.cipher C.public D.private A.interpretation B.signatures C.encryption D.decryption A.plain B.cipher C.public D.private
第2题:
第3题:
In a public-key cryptosystem,(71)encrypted with the public key can only be deciphered with the private key from the same(72). Conversely,(71)encrypted with the private key can be decrypted only with the public key. Users can make their public keys(73)available or place them at a key distribution center or others to access. However, the private key must be(74)safe. In public-key systems there's no(75)to find a safe channel for communicating a shared secret key.
A.binarytext
B.hypertext
C.plaintext
D.supertext
第4题:
What is the objective of Diffie-Hellman?()
第5题:
Which three are distinctions between asymmetric and symmetric algorithms? ()
第6题:
第7题:
IPSEC技术的IKE(Internet key exchange)协议不包含以下哪个协议?()
第8题:
A. A session key value is exchanged across the network.
B. A session key never passes across the network.
C. A session key is used as the key for asymmetric data encryption.
D. A session key is used as the key for symmetric data encryption.
第9题:
Which statement is true about a certificate authority?()
第10题:
Which of the following statements that describe Diffie Hellman Key exchange are correct? ()