Author Question: Public key algorithms are based on mathematical functions rather than on simple operations on bit ... (Read 172 times)

rl

  • Hero Member
  • *****
  • Posts: 579
Public key algorithms are based on mathematical functions rather than on simple operations on bit patterns.
 
  Indicate whether the statement is true or false.

Question 2

The security of the Diffie-Hellman key exchange lies in the fact that, while it is relatively easy to calculate exponentials modulo a prime, it is very easy to calculate discrete logarithms.
 
  Indicate whether the statement is true or false.



lauravaras

  • Sr. Member
  • ****
  • Posts: 347
Answer to Question 1

T

Answer to Question 2

F



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

About one in five American adults and teenagers have had a genital herpes infection—and most of them don't know it. People with genital herpes have at least twice the risk of becoming infected with HIV if exposed to it than those people who do not have genital herpes.

Did you know?

When taking monoamine oxidase inhibitors, people should avoid a variety of foods, which include alcoholic beverages, bean curd, broad (fava) bean pods, cheese, fish, ginseng, protein extracts, meat, sauerkraut, shrimp paste, soups, and yeast.

Did you know?

Blood in the urine can be a sign of a kidney stone, glomerulonephritis, or other kidney problems.

Did you know?

In 1886, William Bates reported on the discovery of a substance produced by the adrenal gland that turned out to be epinephrine (adrenaline). In 1904, this drug was first artificially synthesized by Friedrich Stolz.

Did you know?

Human neurons are so small that they require a microscope in order to be seen. However, some neurons can be up to 3 feet long, such as those that extend from the spinal cord to the toes.

For a complete list of videos, visit our video library