CIS 502 MENTOR Great Stories/cis502mentor.com CIS 502 MENTOR Great Stories/cis502mentor.com | 页面 3

• • 2 3 Public key cryptography is another name for: A running-key cipher can be used when: • 4 Two parties, Party A and Party B, regularly exchange messages using public key cryptography. One party, Party A, believes that its private encryption key has been compromised. What action should Party B take? • 5 Two parties that have never communicated before wish to send messages using symmetric encryption key cryptography. How should the parties begin? • 6 A stream cipher encrypts data by XORing plaintext with the encryption key. How is the ciphertext converted back into plaintext? • 7 Two parties that have never communicated before wish to send messages using asymmetric key cryptography. How should the parties begin?