Follow Our FB Page << CircleMedia.in >> for Daily Laughter. We Post Funny, Viral, Comedy Videos, Memes, Vines...

Cryptography General Interview Questions
Questions Answers Views Company eMail

What if users of RSA run out of distinct primes?

TCS,

390

Are certifying authorities susceptible to attack?

TCS,

406

How are certificates used?

TCS,

387

Should a public key or private key be shared among users?

TCS,

335

What key management issues are involved in public-key cryptography?

TCS,

340

What role does NIST play in cryptography?

TCS,

407

How can signatures remain valid beyond the expiration dates of their keys, or, How do you verify a 20-year-old signature?

TCS,

363

What happens if my private key is compromised?

TCS,

347

Who issues certificates and how?

TCS,

419

Does RSA help detect altered documents and transmission errors?

TCS,

415

What is authentication? What is a digital signature?

TCS,

359

Why is Clipper controversial?

TCS,

397

Who needs a key?

TCS,

406

How is RSA used for authentication in practice?

TCS,

405

How much extra message length is caused by using RSA?

TCS,

383


Post New Cryptography General Questions

Un-Answered Questions { Cryptography General }

What are the ITU-T (CCITT) Standards ?

1418


Does RSA help detect altered documents and transmission errors?

415


What is the legal status of documents signed with digital signatures?

380


How is RSA used for authentication in practice?

405


What is a compression function?

385






How does the length of a hash value affect security?

339


What is shamirs secret sharing scheme?

367


What is a linear feedback shift register?

380


What is DNA computing ?

2713


What are pseudo-collisions?

350


What are the best factoring methods in use today ?

1539


What are the shrinking and self-shrinking generators?

312


What is a CSU, or, How do certifying authorities store their private keys?

374


What is identification ?

1892


Can users of rsa run out of distinct primes?

437