DSA protocol is based on
(a) Discrete logarithm problem
(b) Continuous logarithm problem
(c) Discrete & Continuous logarithm problem
(d) None of the mentioned
I had been asked this question in an internship interview.
I want to ask this question from Pretty Good Privacy topic in section Encryption and Decryption of Digital Communications