正在加载图片...
o Review: Public-key Technology Public-key Technology Based on asymmetric cryptographic algorithms Public-Private Key Pairs Services: confidentiality, integrity, authentication and non-repudiation Cryptanalyst Cryptanalyst Source a Destination B Source a Destination B Encryption Decryption Decryption Destinati Algorithm Algorithm Algerithm KUa 復大辱软件学院 LiJTLiJT Review: Public-key Technology • Public-key Technology – Based on asymmetric cryptographic algorithms – Public-Private Key Pairs – Services: confidentiality, integrity, authentication and non-repudiation
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有