If we use exponentiation to encrypt/decrypt, the adversary can use logarithm to attack and this method is very efficient.
If we use exponentiation to encrypt/decrypt, the adversary can use logarithm to attack and this method is very efficient. Correct Answer False
The first part of the statement is true. But this method is very inefficient as it uses the exhaustive search method.
মোঃ আরিফুল ইসলাম
Feb 20, 2025