The purpose for this algorithm is to enable two
users to exchange a key securely that can then be used for subsequent encryption
of messages. It depends for its effectiveness on the difficulty of computing
discrete logarithms.
0
comments:
Feel free to contact the admin for any suggestions and help.
0 comments:
Feel free to contact the admin for any suggestions and help.