Can we do the project in ENCRYPTION AND DECRYPTION as a operating system project? If yes how can we use the concepts?
Visa,
1 5498Post New Cryptography General Questions
What if the certifying authority's key is lost or compromised?
What is feal?
How do elliptic curve cryptosystems compare with other cryptosystems ?
Is cryptography exportable from the U.S.?
What is a stream cipher?
Which two cryptographic mechanisms provide authentication schemes?
Should a public key or private key be shared among users?
What are elliptic curve cryptosystems ?
What is Fortezza ?
What are elliptic curves ?
Is RSA a de facto standard? Why is a de facto standard important?
What is blowfish?
How can signatures remain valid beyond the expiration dates of their keys, or, How do you verify a 20-year-old signature?
What are CAPIs ?
What are the alternatives to rsa?