Introduction to Cryptography - Old Questions
b) How can public-key cryptography be used
for document authentication? (5)
OR
What seems so counterintuitive about the
counter mode (CTR) for using a block cipher?
5 marks
|
Asked in 2068