Author Question: Public key algorithms are based on mathematical functions rather than on simple operations on bit ... (Read 173 times)

rl

  • Hero Member
  • *****
  • Posts: 579
Public key algorithms are based on mathematical functions rather than on simple operations on bit patterns.
 
  Indicate whether the statement is true or false.

Question 2

The security of the Diffie-Hellman key exchange lies in the fact that, while it is relatively easy to calculate exponentials modulo a prime, it is very easy to calculate discrete logarithms.
 
  Indicate whether the statement is true or false.



lauravaras

  • Sr. Member
  • ****
  • Posts: 347
Answer to Question 1

T

Answer to Question 2

F



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

In 1844, Charles Goodyear obtained the first patent for a rubber condom.

Did you know?

The first war in which wide-scale use of anesthetics occurred was the Civil War, and 80% of all wounds were in the extremities.

Did you know?

Stevens-Johnson syndrome and Toxic Epidermal Necrolysis syndrome are life-threatening reactions that can result in death. Complications include permanent blindness, dry-eye syndrome, lung damage, photophobia, asthma, chronic obstructive pulmonary disease, permanent loss of nail beds, scarring of mucous membranes, arthritis, and chronic fatigue syndrome. Many patients' pores scar shut, causing them to retain heat.

Did you know?

Many of the drugs used by neuroscientists are derived from toxic plants and venomous animals (such as snakes, spiders, snails, and puffer fish).

Did you know?

If all the neurons in the human body were lined up, they would stretch more than 600 miles.

For a complete list of videos, visit our video library