Encryption Decryption Interview Questions
Questions Answers Views Company eMail

What is an encryption "key" and what is the importance of key length?

935

What is an algorithm?

1086

What is public key encryption?

887




What is are "proprietary" and "public" cryptographic algorithms?

996

What is the function of random numbers in encryption and how are they generated?

905

What is cryptographic synchronisation?

1175

What are "stream" and "block" ciphers?

877

What is the difference between hardware and software encryption?

1 3493




What information can be obtained from encrypted file?

924

What is the difference between Kryptel and Silver Key?

1058

How to remove the Kryptel (Silver Key) icon from the desktop?

940

Blowfish uses the longest key. Does this mean it is the strongest cipher?

1316

How to change the encrypted file icon?

1301

Is there a limit on the file size or on the number of encrypted files?

1013

How to change the location of the Kryptel (Silver Key) program group?

892


Post New Encryption Decryption Questions






Un-Answered Questions { Encryption Decryption }

A company wants to transmit data over the telephone, but it is concerned that its phones may be tapped. All of its data is transmitted as four-digit integers. It has asked you to write a program that will encrypt its data so that the data may be transmitted more securely. Your script should read a four digit integer entered by the user in a prompt dialog and encrypt it as follows: Replace each digit by (the sum of that digit plus 7) modulus 10. Then swap the first digit with the third, and swap the second digit with the fourth. Then output XHTML text that displays the encrypted integer.

2293


What is a zed encoder? How does it work?

1171


How to change the location of the Kryptel (Silver Key) program group?

892


What is meant by 1024, 2048, 5096 bit encryption?

2374


whats cryptanalysis?

1033






What is the difference between Kryptel and Silver Key?

1058


What is secret-key cryptography ?

2936


What is exhaustive key search ?

1076


What information can be obtained from encrypted file?

924


How to I prevent other users from using Kryptel (Silver Key)?

982


What is key management ?

1076


What is an algorithm?

1086


How do certifying authorities store their private keys ?

1320


What is are "proprietary" and "public" cryptographic algorithms?

996


How can we use quantum properties in cryptography ?

770