Cryptography General Interview Questions
Questions Answers Views Company eMail

What if users of RSA run out of distinct primes?

TCS,

514

Are certifying authorities susceptible to attack?

TCS,

516

How are certificates used?

TCS,

505

Should a public key or private key be shared among users?

TCS,

439

What key management issues are involved in public-key cryptography?

TCS,

457

What role does NIST play in cryptography?

TCS,

526

How can signatures remain valid beyond the expiration dates of their keys, or, How do you verify a 20-year-old signature?

TCS,

473

What happens if my private key is compromised?

TCS,

476

Who issues certificates and how?

TCS,

530

Does RSA help detect altered documents and transmission errors?

TCS,

535

What is authentication? What is a digital signature?

TCS,

471

Why is Clipper controversial?

TCS,

522

Who needs a key?

TCS,

528

How is RSA used for authentication in practice?

TCS,

521

How much extra message length is caused by using RSA?

TCS,

511


Post New Cryptography General Questions

Un-Answered Questions { Cryptography General }

How do digital timestamps support digital signatures?

505


What is the discrete log problem?

546


Explain the meaning of Cryptography.

589


What is NIST ?

1454


What is SecurID ?

1484






What is RSAREF?

524


Who issues certificates and how?

530


What is shamirs secret sharing scheme?

497


What are the most important attacks on MACs ?

1461


Is DSS secure?

478


What is a one-way function ?

2030


What is primality testing ?

1364


What is the quantum cryptography?

496


What is the legal status of documents signed with digital signatures?

509


What is authenticated diffie-hellman key agreement?

430