The security of the RSA algorithm depends on two mathematic problems: the problem of factoring very large numbers, p and q, and the ____ problem.

A. RSA
B. ElGamal
C. Diffie-Hellman
D. discrete logarithm


Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following is most closely associated with the statement, "Occurs for a given node when a drag operation that started in a different node continues over the given node."

a. onMouseDragEntered b. onMouseDragExited c. onMouseDragged d. onMouseDragOver

Computer Science & Information Technology

The UNIX and Linux operating systems comprise a growing segment in the operating systems market.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Panel ____ organize related panels.

a. collections b. groups c. bars d. layers

Computer Science & Information Technology

What is meant by the OLAP term "consolidation"?

What will be an ideal response?

Computer Science & Information Technology