A.加密大量数据B.加密少量数据C.密钥恢复D.密钥撤销
A.对称算法B.哈希C.非对称算法D.公钥基础设施
A.EavesdroppingB.Man-in-the-middleC.Social engineeringD.Brute force