Cryptography Interview Questions
Questions Answers Views Company eMail

What is the life cycle of a key ?

1 3228

Who needs a key pair ?

3 4661

How does one get a key pair ?

TCS,

1 3094

What happens when a key expires ?

TCS,

2 4019

What happens if my key is lost ?

1 3322

What happens if a private key is compromised ?

1 3357

How should I store my private key ?

TCS,

2015

How to find someone else?s public key ?

2 4976

How do certifying authorities store their private keys ?

1970

What if a certifying authority?s key is lost or compromised ?

1 3495

What is key recovery ?

1 4011

What are some of the more popular techniques in cryptography ?

2313

How is cryptography applied ?

2070

What are cryptography standards ?

1773

What is the role of the United States government in cryptography ?

1382


Un-Answered Questions { Cryptography }

What is a more in-depth definition of a miner??

1


What do you mean by blocks within the blockchain technology?

1


When talking about a “transaction”, does any action on a blockchain represent a transfer of value?

1


What are the different types of blockchain technology/ledger?

5


What is secret sharing? Will it have any benefit in blockchain technology?

1






A company wants to transmit data over the telephone, but it is concerned that its phones may be tapped. All of its data is transmitted as four-digit integers. It has asked you to write a program that will encrypt its data so that the data may be transmitted more securely. Your script should read a four digit integer entered by the user in a prompt dialog and encrypt it as follows: Replace each digit by (the sum of that digit plus 7) modulus 10. Then swap the first digit with the third, and swap the second digit with the fourth. Then output XHTML text that displays the encrypted integer.

3014


What is remix?

1


What is private blockchain? Give examples?

5


What are the ITU-T (CCITT) Standards ?

1514


What is a block in blockchain?

1


Does IAIK support RC4 ? Is the code written the same way as for RC2 ?

1407


What are the alternatives to rsa?

505


Is use of DSS covered by any patents?

474


Can rsa be attacked? If so, how?

1


How are blocks changed together?

5