Open In App
Related Articles

ISRO | ISRO CS 2018 | Question 35

Improve
Improve
Improve
Like Article
Like
Save Article
Save
Report issue
Report

A particular BNF definition for a \”word\” is given by the following rules. Which of the following lexical entries can be derived from < word > ? I. pick II. picks III. c44

(A)

I, II and III

(B)

I and II only

(C)

l and III only

(D)

lI and III only



Answer: (D)

Explanation:

All of the given options are used in asymmetric key cryptography:

RSA algorithm: RSA is a public-key cryptosystem that is widely used for secure communication and data storage.

Diffie-Hellman key exchange algorithm: Diffie-Hellman is a key exchange protocol that allows two parties to securely generate a shared secret key over an insecure channel.

Elliptic curve cryptography (ECC): ECC is a type of public-key cryptography that uses elliptic curves to provide security. It is more efficient than RSA and Diffie-Hellman, and is often used in mobile devices and other resource-constrained environments.



Quiz of this Question
Please comment below if you find anything wrong in the above post

Last Updated : 03 Jul, 2018
Like Article
Save Article
Previous
Next
Share your thoughts in the comments
Similar Reads