Content deleted Content added
Denisarona (talk | contribs) m Reverted edits by 103.206.105.66 (talk) to last version by Klbrain |
|||
Line 15:
The second approach is theoretical and is based on the [[computational complexity theory]]. If problem A is hard, there exists a formal [[Reduction (complexity)|security reduction]] from a problem which is widely considered unsolvable in [[polynomial time]], such as [[integer factorization]] problem or [[discrete logarithm]] problem.
However, non-existence of a polynomial time algorithm does not automatically ensure that the system is secure. The difficulty of a problem also depends on its size. For example, [[RSA public key cryptography]] relies on the difficulty of [[integer factorization]]. However, it is considered secure only with keys that are at least
==Cryptographic hash functions==
|