What is the secure hash algorithm (sha and sha-1)?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More Cryptography General Interview Questions

Is cryptography patentable in the U.S.?

0 Answers   TCS,


How do digital timestamps support digital signatures?

0 Answers  


What are the alternatives to rsa?

0 Answers  


Which cryptographic mechanism provides non-repudiation?

0 Answers  


What is shamirs secret sharing scheme?

0 Answers  






What role does the NSA play in commercial cryptography?

0 Answers   TCS,


Is cryptography exportable from the U.S.?

0 Answers   TCS,


What is Clipper ?

1 Answers   TCS,


What is Capstone ?

3 Answers   TCS,


How can signatures remain valid beyond the expiration dates of their keys, or, How do you verify a 20-year-old signature?

0 Answers   TCS,


What is seal?

0 Answers  


How do I find someone else's public key?

0 Answers   TCS,


Categories
  • Cryptography Algorithms Interview Questions Cryptography Algorithms (52)
  • Digital Certificates Interview Questions Digital Certificates (23)
  • Encryption Decryption Interview Questions Encryption Decryption (77)
  • Ciphers Interview Questions Ciphers (43)
  • Cryptography Protocols Interview Questions Cryptography Protocols (31)
  • Blockchain Interview Questions Blockchain (338)
  • Cryptography General Interview Questions Cryptography General (154)
  • Cryptography AllOther Interview Questions Cryptography AllOther (0)