Which asymmetric algorithm, based on modular logarithms, is used to establish and exchange asymmetric keys over an insecure medium? Group of answer choices: RSA (Rivest-Shamir-Adleman) Elliptic Curve Cryptography (ECC) Diffie-Hellman El Gamal

icon
Related questions
Question

Don't use AI and give detailed explanation.

Which asymmetric algorithm, based on modular logarithms, is used to
establish and exchange asymmetric keys over an insecure medium?
Group of answer choices:
RSA (Rivest-Shamir-Adleman)
Elliptic Curve Cryptography (ECC)
Diffie-Hellman
El Gamal
Transcribed Image Text:Which asymmetric algorithm, based on modular logarithms, is used to establish and exchange asymmetric keys over an insecure medium? Group of answer choices: RSA (Rivest-Shamir-Adleman) Elliptic Curve Cryptography (ECC) Diffie-Hellman El Gamal
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 3 steps

Blurred answer