1.

If we use exponentiation to encrypt/decrypt, the adversary can use logarithm to attack and this method is very efficient.

A. True
B. False
Answer» C.


Discussion

No Comment Found