Friday, September 18, 2015

4.1-4.2 and 4.4, due on September 21

1. I had a hard time understanding how to get Ki from K. I think I followed the rest for the most part, but I don't feel like I have a good grasp of it; it would take some time to figure out how to apply it to a real problem.

2. This seems like such an elaborate scheme. It seems so fabricated with so many rules, and it seems that it would take so much longer to encrypt than was worth the security. However, I bet it's faster and pretty efficient with a computer. It's just hard for me to see.

No comments:

Post a Comment