Home > other >  Information security
Information security

Time:11-27

Suppose A and B to complete A communication, specific safety requirements are as follows:
(1) even if the information in the process of transmission was intercepted by a third party will not leak information;
(2) try to complete the task efficiently,
Please design A specific, help A, B both sides to complete communication,
Requirements:
(1) describe the scheme adopts technology (clear adopt what kind of encryption technology)
(2) description scheme implementation process
(3) shows that the scheme design is a bit, can reflect the higher efficiency?
  • Related