|
quote:
To ensure message integrity, confidentiality and nonrepudiation between two parties, the MOST effective method would be to create a message digest by applying a cryptographic hashing algorithm against:
A. the entire message, enciphering the message digest using the sender's private key, enciphering the message with a symmetric key and enciphering the key by using the receiver's public key.
B. any part of the message, enciphering the message digest using the sender's private key, enciphering the message with a symmetric key and enciphering the key using the receiver's public key.
C. the entire message, enciphering the message digest using the sender's private key, enciphering the message with a symmetric key and enciphering the symetric key using the receiver's public key.
D. the entire message, enciphering the message digest using the sender's private key and enciphering the message using the receiver's public key.
在非对称加密体制中用对方的private key进行加密,用public key进行解密 所以选a 例如:rsa [/QU
选D也可以吧,...the entire message, enciphering the message digest using the sender's private key 是数字签名,保证了 integrity,nonrepudiation 而enciphering the message using the receiver's public key保证了confidentiality
在非对称加密体制中 为了保护密钥 所以引入了两个key ,一个为密钥(private)一个为公钥(pubilc),通常利用两个互质的数通过计算得到这两个key,这样做同时保证了密钥的保密性,同样也做到了抗抵赖和可验证性。 答案D提到的用发送者的密钥进行加密,用接受者公钥进行解密,这样做无法保证在分布式系统的信息的可验证性与抗抵赖,同时也不满足非对称式加密体系。 |
|