Can we do the project in ENCRYPTION AND DECRYPTION as a
operating system project? If yes how can we use the concepts?
Answer Posted / neha bhagat
Yes we can. All the information will be stored in encrypted
form in memory. During fetching, it must be first decrypted
by operating system and then can be read.
Is This Answer Correct ? | 19 Yes | 4 No |
Post New Answer View All Answers
What is authentication? What is a digital signature?
Who needs a key?
How can signatures remain valid beyond the expiration dates of their keys, or, How do you verify a 20-year-old signature?
What is primality testing ?
Is RSA a de facto standard? Why is a de facto standard important?
What is SecurID ?
What is the current status of DSS?
What is the significance of one-way functions for cryptography?
What is a birthday attack?
How is rsa used for authentication in practice? What are rsa digital signatures?
What is shamirs secret sharing scheme?
Does RSA help detect altered documents and transmission errors?
What is IEEE P1363 ?
What is cryptanalysis ?
How are certifying authorities susceptible to attack ?