Open In App
Related Articles

ISRO | ISRO CS 2018 | Question 35

Like Article
Save Article
Report issue

A particular BNF definition for a \”word\” is given by the following rules. Which of the following lexical entries can be derived from < word > ? I. pick II. picks III. c44


I, II and III


I and II only


l and III only


lI and III only

Answer: (D)


All of the given options are used in asymmetric key cryptography:

RSA algorithm: RSA is a public-key cryptosystem that is widely used for secure communication and data storage.

Diffie-Hellman key exchange algorithm: Diffie-Hellman is a key exchange protocol that allows two parties to securely generate a shared secret key over an insecure channel.

Elliptic curve cryptography (ECC): ECC is a type of public-key cryptography that uses elliptic curves to provide security. It is more efficient than RSA and Diffie-Hellman, and is often used in mobile devices and other resource-constrained environments.

Quiz of this Question
Please comment below if you find anything wrong in the above post

Last Updated : 03 Jul, 2018
Like Article
Save Article
Share your thoughts in the comments
Similar Reads