This preview shows page 1. Sign up to view the full content.
Unformatted text preview: exchange with your friend through the Internet, is this end-to-end encryption or link-based encryption? A. end-to-end B. link based 5. In authenticity, it is still necessary to encrypt the entire message. A. True B. False 6. I want to send a msg to the whole class and also want everyone to verify the authenticity of my msg. Suppose I choose public key/private key scheme, which key should I use to encrypt my msg? A. my public key B. my private key...
View Full Document
This note was uploaded on 11/02/2010 for the course EE 136 taught by Professor Kang xi during the Spring '10 term at NYU Poly.
- Spring '10
- KANG XI