Author Question: Public key algorithms are based on mathematical functions rather than on simple operations on bit ... (Read 160 times)

rl

  • Hero Member
  • *****
  • Posts: 579
Public key algorithms are based on mathematical functions rather than on simple operations on bit patterns.
 
  Indicate whether the statement is true or false.

Question 2

The security of the Diffie-Hellman key exchange lies in the fact that, while it is relatively easy to calculate exponentials modulo a prime, it is very easy to calculate discrete logarithms.
 
  Indicate whether the statement is true or false.



lauravaras

  • Sr. Member
  • ****
  • Posts: 347
Answer to Question 1

T

Answer to Question 2

F



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

On average, the stomach produces 2 L of hydrochloric acid per day.

Did you know?

Walt Disney helped combat malaria by making an animated film in 1943 called The Winged Scourge. This short film starred the seven dwarfs and taught children that mosquitos transmit malaria, which is a very bad disease. It advocated the killing of mosquitos to stop the disease.

Did you know?

Signs and symptoms of a drug overdose include losing consciousness, fever or sweating, breathing problems, abnormal pulse, and changes in skin color.

Did you know?

In the United States, there is a birth every 8 seconds, according to the U.S. Census Bureau's Population Clock.

Did you know?

Long-term mental and physical effects from substance abuse include: paranoia, psychosis, immune deficiencies, and organ damage.

For a complete list of videos, visit our video library