InterviewSolution
Saved Bookmarks
| 1. |
If we use exponentiation to encrypt/decrypt, the adversary can use logarithm to attack and this method is very efficient.(a) True(b) FalseThis question was addressed to me in semester exam.I'd like to ask this question from Number Theory in portion More Number Theory of Cryptograph & Network Security |
|
Answer» The CORRECT option is (b) False |
|