Can we do the project in ENCRYPTION AND DECRYPTION as a
operating system project? If yes how can we use the concepts?
Answer / neha bhagat
Yes we can. All the information will be stored in encrypted
form in memory. During fetching, it must be first decrypted
by operating system and then can be read.
| Is This Answer Correct ? | 19 Yes | 4 No |
What is PSS/PSS-R ?
What are biometric techniques ?
What is the factoring problem ?
Why use RSA rather than DES?
What are some other cryptography specifications ?
Should a public key or private key be shared among users?
Can rsa be exported from the united states?
What are the prospects for theoretical factoring breakthroughs?
How can signatures remain valid beyond the expiration dates of their keys, or, How do you verify a 20-year-old signature?
What is iKP ?
What are the prospects for a theoretical breakthrough in the discrete log problem ?
What is Capstone ?