If we use exponentiation to encrypt/decrypt, the adversary can use logarithm to attack and this method is very efficient.
(a) True
(b) False
This question was addressed to me in semester exam.
I'd like to ask this question from Number Theory in portion More Number Theory of Cryptograph & Network Security