If an attacker intercepts the public values exchanged during the Diffie-Hellman key exchange, what is the main difficulty for the attacker to compute the shared secret key?
If an attacker intercepts the public values exchanged during the Diffie-Hellman key exchange, what is the main difficulty for the attacker to compute the shared secret key?
* השאלה נוספה בתאריך: 15-08-2024