VibraXX
Live Quiz Arena
🎁 1 Free Round Daily
⚡ Enter Arena
HomeCategoriesLogic & PuzzlesQuestion
Question
Logic & Puzzles

If a cryptographic key's modulus (n) is factored into primes p and q, which vulnerability becomes prominent when p and q are close?

A)Brute force key recovery
B)Meet-in-the-middle attack efficiency
C)Fermat's factorization method efficacy
D)Birthday paradox collision vulnerability

💡 Explanation

Fermat's factorization method exploits the difference between two squares to factorize a number; it is most efficient when the factors are close. Therefore, close primes p and q lead to a small difference of squares, making Fermat's method effective, rather than brute force or collision attacks.

🏆 Up to £1,000 monthly prize pool

Ready for the live challenge? Join the next global round now.
*Terms apply. Skill-based competition.

⚡ Enter Arena

Related Questions

Browse Logic & Puzzles