1.

If we use exponentiation to encrypt/decrypt, the adversary can use logarithm to attack and this method is very efficient.(a) True(b) FalseThis question was addressed to me in semester exam.I'd like to ask this question from Number Theory in portion More Number Theory of Cryptograph & Network Security

Answer»

The CORRECT option is (b) False

To explain: The first part of the statement is true. But this method is very inefficient as it uses the EXHAUSTIVE SEARCH method.



Discussion

No Comment Found

Related InterviewSolutions