Cryptography General Interview Questions
Questions Answers Views Company eMail

What if users of RSA run out of distinct primes?

TCS,

501

Are certifying authorities susceptible to attack?

TCS,

504

How are certificates used?

TCS,

490

Should a public key or private key be shared among users?

TCS,

429

What key management issues are involved in public-key cryptography?

TCS,

446

What role does NIST play in cryptography?

TCS,

511

How can signatures remain valid beyond the expiration dates of their keys, or, How do you verify a 20-year-old signature?

TCS,

456

What happens if my private key is compromised?

TCS,

462

Who issues certificates and how?

TCS,

520

Does RSA help detect altered documents and transmission errors?

TCS,

517

What is authentication? What is a digital signature?

TCS,

461

Why is Clipper controversial?

TCS,

512

Who needs a key?

TCS,

519

How is RSA used for authentication in practice?

TCS,

506

How much extra message length is caused by using RSA?

TCS,

497


Post New Cryptography General Questions

Un-Answered Questions { Cryptography General }

Does RSA help detect altered documents and transmission errors?

517


Is use of DSS covered by any patents?

475


At what point does an attack become practical ?

1365


What is SET ?

1497


What are some other hard problems ?

1521






Is DSS secure?

466


What is the GSS-API ?

2103


What is the current status of DSS?

487


What is a linear feedback shift register?

484


What are proactive security techniques ?

2052


Why use RSA rather than DES?

516


What are ANSI X9 standards ?

1535


How is rsa used for authentication in practice? What are rsa digital signatures?

430


What are the advantages and disadvantages of public-key cryptography over secret-key cryptography?

442


Who issues certificates and how?

520