Erstellt von Alex Neves
vor mehr als 8 Jahre
|
||
Briefly describe Public-key Encryption
What is Public-key Encryption used for?
5 differences between symmetric and asymmetric encryption
State the 3 mathematical principles used in asymmetric cryptology
What is the congruence relation?
Give the eqivalences of modular arithmetic
What is a discrete logarithm? Draw the expression
What is a primitive root?
What is DHKEX?
Describe the 5 steps of DHKEX
Why is DHKEX secure? Draw equation to be solved
What is DHKEX vulnerable to?
Describe the Logjam attack.
What is PFS?
What is Elliptic Curve?