Question
a.
Discrete logarithm problem
b.
Continuous logarithm problem
c.
Discrete & Continuous logarithm problem
d.
None of the mentioned
Posted under Cryptography and Network Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. DSA protocol is based on
Similar Questions
Discover Related MCQs
Q. The hash function
View solution
Q. In hash function output length is fixed.
View solution
Q. The digital signature provides authentication to the
View solution
Q. Which should be used first to decrypt?
View solution
Q. Which algorithm is used for public key encryption?
View solution
Q. What is the key size allowed in PGP?
View solution
Q. Which operation is used in encryption using IDEA?
View solution
Q. The key size of DES is
View solution
Q. These three ciphers can operate of ______ of plaintext and cipher text.
View solution
Q. Which block cipher has key length of 128 bits?
View solution
Q. PGP offers _____ block ciphers for message encryption.
View solution
Q. Data compression includes
View solution
Q. For digital signatures private key cryptosystem is used.
View solution
Q. Public key cryptosystem is used for the encryption of
View solution
Q. Pretty good privacy (PGP) security system uses
View solution
Q. Euler’s totient function is determined by
View solution
Q. Public key cryptosystem is also known as
View solution
Q. Which should be kept as a secret in public key cryptosystem?
View solution
Q. Public key cryptosystem uses same key for both encryption and decryption.
View solution
Q. Synchronous ciphers uses
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cryptography and Network Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!