Applications of public-key cryptosystems

1 What is the difference between little-endian and big-endian format?

2 What basic arithmetical and logical functions are used in SHA?

3 Describe the set of criteria used by NIST to evaluate SHA-3 candidates.

4 Define the term sponge construction.

5 Briefly describe the internal structure of the iteration function f.

1 What is the difference between an index and a discrete logarithm?

2 What are the principal elements of a public-key cryptosystem?

3 What are the roles of the public and private key?

4 What are three broad categories of applications of public-key cryptosystems?

5 What requirements must a public-key cryptosystems fulfill to be a secure algorithm?

My Master Papers
Calculate your paper price
Pages (550 words)
Approximate price: -