Can we do the project in ENCRYPTION AND DECRYPTION as a operating system project? If yes how can we use the concepts?
Visa,
1 5492Post New Cryptography General Questions
What are interactive proofs and zero-knowledge proofs ?
What are some other cryptography specifications ?
What are the most important attacks on MACs ?
How are certifying authorities susceptible to attack ?
What is a hash function? What is a message digest?
What are covert channels ?
Is cryptography patentable in the U.S.?
What are some of the basic types of cryptanalytic attack ?
How does the length of a hash value affect security?
What is seal?
What are the advantages and disadvantages of public-key cryptography over secret-key cryptography?
What is identification ?
What is SET ?
What if the certifying authority's key is lost or compromised?
Has factoring been getting easier?