Answer Posted / shri praksh verma
for encryption and decryption
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
why hash functions are not used for encryption but authentication ?
What is the difference between a message authentication code (MAC) and a one-way hash?
What is a zed encoder? How does it work?
What are the ecb and cbc modes?
WHAT IS A SAMPLE USER INTERFACE OF DES ENCRYPTION/DECRYPTION PROJECT?
Does encryption of connection strings in web.config file possible? How?
What is exhaustive key search ?
What is meant by 1024, 2048, 5096 bit encryption?
What is nonlinear cryptography?
What information can be obtained from encrypted file?
What is the elgamal cryptosystem?
What is the Popular Symmetric-Key Encryption Method
What are some other public key cryptosystems ?
What is the mceliece cryptosystem?
What is public-key cryptography ?