Skip to content
- Explain the difference between symmetric and asymmetric encryption. Describe a method of asymmetric encryption, and discuss the vulnerabilities of it.
- Assume a public key for RSA encryption given by the pair (143,11). Find the private key corresponding to this pair.
- Using the pair (143, 11), decode the encrypted message (111 4 88 57 116 67) assuming the letters were represented by ASCII values
- Describe in detail the Diffie-Hellman protocol for three parties Alice, Bob and Carol.Sample Page