Hello. In Snort, how a digital signature is actually created
for the authentication purpose and thereby provides
intrusion detection as well as prevention. How the software
for IDS/IPS comes to know regarding the
threat/vulnerability using digital signature ? Whether any
specific language or programming is used or not.
whats cryptanalysis?
What if a certifying authority?s key is lost or compromised ?
What Is Encryption?
What is the function of random numbers in encryption and how are they generated?
Actual role of cryptography is data security .Explain with real world example?
Blowfish uses the longest key. Does this mean it is the strongest cipher?
what is the difference between encryption and hashing?
Can the computer which has been used for encryption be traced?
What is an encryption "key" and what is the importance of key length?
What is Plaintext?
What are the counter and pcbc modes?
How does one find random numbers for keys ?