Can we do the project in ENCRYPTION AND DECRYPTION as a
operating system project? If yes how can we use the concepts?
Answer / neha bhagat
Yes we can. All the information will be stored in encrypted
form in memory. During fetching, it must be first decrypted
by operating system and then can be read.
Is This Answer Correct ? | 19 Yes | 4 No |
What is safer?
What are proactive security techniques ?
What if the certifying authority's key is lost or compromised?
How can signatures remain valid beyond the expiration dates of their keys, or, How do you verify a 20-year-old signature?
How do digital timestamps support digital signatures?
What is primality testing ?
What are the prospects for theoretical factoring breakthroughs?
What are LEAFs ?
What are the advantages and disadvantages of public-key cryptography over secret-key cryptography?
What are the best discrete logarithm methods in use today ?
What are RC2 and RC4?
What is a one-way function ?