Secure algorithms

1 What is the difference between little-endian and big-endian format?

2 What basic arithmetical and logical functions are used in SHA?

3 Describe the set of criteria used by NIST to evaluate SHA-3 candidates.

4 Define the term sponge construction.

5 Briefly describe the internal structure of the iteration function f.

1 What is the difference between an index and a discrete logarithm?

2 What are the principal elements of a public-key cryptosystem?

3 What are the roles of the public and private key?

4 What are three broad categories of applications of public-key cryptosystems?

5 What requirements must a public-key cryptosystems fulfill to be a secure algorithm?

Solution:

Looking for help with your homework?
Grab a 30% Discount and Get your paper done!

30% OFF
Turnitin Report
Formatting
Title Page
Citation
Place an Order

Calculate your paper price
Pages (550 words)
Approximate price: -