Author Question: Public key algorithms are based on mathematical functions rather than on simple operations on bit ... (Read 157 times)

rl

  • Hero Member
  • *****
  • Posts: 579
Public key algorithms are based on mathematical functions rather than on simple operations on bit patterns.
 
  Indicate whether the statement is true or false.

Question 2

The security of the Diffie-Hellman key exchange lies in the fact that, while it is relatively easy to calculate exponentials modulo a prime, it is very easy to calculate discrete logarithms.
 
  Indicate whether the statement is true or false.



lauravaras

  • Sr. Member
  • ****
  • Posts: 347
Answer to Question 1

T

Answer to Question 2

F



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

An identified risk factor for osteoporosis is the intake of excessive amounts of vitamin A. Dietary intake of approximately double the recommended daily amount of vitamin A, by women, has been shown to reduce bone mineral density and increase the chances for hip fractures compared with women who consumed the recommended daily amount (or less) of vitamin A.

Did you know?

Only 12 hours after an egg cell is fertilized by a sperm cell, the egg cell starts to divide. As it continues to divide, it moves along the fallopian tube toward the uterus at about 1 inch per day.

Did you know?

Vaccines cause herd immunity. If the majority of people in a community have been vaccinated against a disease, an unvaccinated person is less likely to get the disease since others are less likely to become sick from it and spread the disease.

Did you know?

Colchicine is a highly poisonous alkaloid originally extracted from a type of saffron plant that is used mainly to treat gout.

Did you know?

Elderly adults are living longer, and causes of death are shifting. At the same time, autopsy rates are at or near their lowest in history.

For a complete list of videos, visit our video library