Is the IAIK-JCE implementation tested on platforms like SUN solaris, Macintosh (OS 7.5, 8.0), HP-UX (10.x)?1466
Is DES available in hardware?
What exactly is DES?
Can DES be used to protect classified information?
shall we use a journalling filesystem on top of /dev/loop?
Which of the two ciphers have the larger key space?
How to make backups?
What are typical key spaces for symmetric and asymmetric ciphers?
How are block ciphers used to encrypt data longer than the block size?
Is the IAIK-JCE implementation tested on platforms like SUN solaris, Macintosh (OS 7.5, 8.0), HP-UX (10.x)?
Why do you keep the name of the used cipher in the open?
What are ECB, CBC, CFB, OFB, and PCBC encryption?
How to prove a new block cipher, is resistant against differential cryptanalysis attack
Can symmetric block ciphers be used for message authentication?
What are some group-theoretic properties of product ciphers?
What is differential cryptanalysis?