what is cryptography?
Answers were Sorted based on User's Feedback
Answer / guest
The science and art of manipulating messages in order to
make them secure is called cryptography......
types are
symmetric key cryptography and asymmetric key cryptography
1)symmetric key cryptography
same key is used for encryption and decryption
eg :DES IDEA AES
2)Asymmetric key:
public key is used for both encryption and decryption
eg:RSA Difere Hellman
Is This Answer Correct ? | 6 Yes | 1 No |
Answer / adu
cryptography is the process of sending data in a secure
manner in a network by using encryption and decryption
techniques. various algorithms are available for encryption
and decryption, for example RSA algorithm.
Is This Answer Correct ? | 2 Yes | 0 No |
Answer / adu
cryptography is the process of sending data in a secure
manner in a network by using encryption and decryption
techniques. various algorithms are available for encryption
and decryption, for example RSA algorithm.
Is This Answer Correct ? | 2 Yes | 0 No |
Answer / janu
Cryptogarphy is the art and science of Converting the
Confidential Messages from Readable format to Unreadable
Format. It is mainly used to sending and receiving an
messages between the Sender and Receiver. There are two
types of Cryptography.
1. Symmetric: Same Key(Public Key) is used for both
Encryption( Unreadable fromat) and Decryption(Readable
Format).
Both sender and Receiver Know this Public key.
2. ASymmetric: Different Key(Private Key) is used for both
Encryption( Unreadable fromat) and Decryption(Readable
Format.
sender Should send a msg to the Receiver with one
key.That's known by Sender alone. The Receiver should use
some Algorithms to find that key and Decrypted the msg.
This type of cryptography is more confidential than the
Symmetric cryptography.
Is This Answer Correct ? | 2 Yes | 0 No |
What are lattice-based cryptosystems ?
Is RSA a de facto standard? Why is a de facto standard important?
What are elliptic curves ?
What is SHS?
Why is Clipper controversial?
What are rsa digital signatures?
Are elliptic curve cryptosystems widely used ?
Which is easier, factoring or discrete log?
What is a compression function?
What is OAEP ?
Who issues certificates and how?
What is RIPEM?