1 What is the difference between little-endian and big-endian format?
2 What basic arithmetical and logical functions are used in SHA?
3 Describe the set of criteria used by NIST to evaluate SHA-3 candidates.
4 Define the term sponge construction.
5 Briefly describe the internal structure of the iteration function f.
1 What is the difference between an index and a discrete logarithm?
2 What are the principal elements of a public-key cryptosystem?
3 What are the roles of the public and private key?
4 What are three broad categories of applications of public-key cryptosystems?
5 What requirements must a public-key cryptosystems fulfill to be a secure algorithm?