海词手机词典
  • In a real world scenario, Alice and Bob use public key (asymmetric) encryption to transfer a secret (symmetric) key and use secret key encryption for the remainder of their session.

    播放读音 播放读音