Can we do the project in ENCRYPTION AND DECRYPTION as a
operating system project? If yes how can we use the concepts?

Answer Posted / neha bhagat

Yes we can. All the information will be stored in encrypted
form in memory. During fetching, it must be first decrypted
by operating system and then can be read.

Is This Answer Correct ?    19 Yes 4 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is authentication? What is a digital signature?

475


Who needs a key?

530


How can signatures remain valid beyond the expiration dates of their keys, or, How do you verify a 20-year-old signature?

476


What is primality testing ?

1368


Is RSA a de facto standard? Why is a de facto standard important?

468






What is SecurID ?

1487


What is the current status of DSS?

500


What is the significance of one-way functions for cryptography?

480


What is a birthday attack?

509


How is rsa used for authentication in practice? What are rsa digital signatures?

451


What is shamirs secret sharing scheme?

501


Does RSA help detect altered documents and transmission errors?

540


What is IEEE P1363 ?

1516


What is cryptanalysis ?

1468


How are certifying authorities susceptible to attack ?

1590