Author Question: Public key algorithms are based on mathematical functions rather than on simple operations on bit ... (Read 147 times)

rl

  • Hero Member
  • *****
  • Posts: 579
Public key algorithms are based on mathematical functions rather than on simple operations on bit patterns.
 
  Indicate whether the statement is true or false.

Question 2

The security of the Diffie-Hellman key exchange lies in the fact that, while it is relatively easy to calculate exponentials modulo a prime, it is very easy to calculate discrete logarithms.
 
  Indicate whether the statement is true or false.



lauravaras

  • Sr. Member
  • ****
  • Posts: 347
Answer to Question 1

T

Answer to Question 2

F



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

People about to have surgery must tell their health care providers about all supplements they take.

Did you know?

Signs and symptoms of a drug overdose include losing consciousness, fever or sweating, breathing problems, abnormal pulse, and changes in skin color.

Did you know?

In Eastern Europe and Russia, interferon is administered intranasally in varied doses for the common cold and influenza. It is claimed that this treatment can lower the risk of infection by as much as 60–70%.

Did you know?

Once thought to have neurofibromatosis, Joseph Merrick (also known as "the elephant man") is now, in retrospect, thought by clinical experts to have had Proteus syndrome. This endocrine disease causes continued and abnormal growth of the bones, muscles, skin, and so on and can become completely debilitating with severe deformities occurring anywhere on the body.

Did you know?

Interferon was scarce and expensive until 1980, when the interferon gene was inserted into bacteria using recombinant DNA technology, allowing for mass cultivation and purification from bacterial cultures.

For a complete list of videos, visit our video library