Can we do the project in ENCRYPTION AND DECRYPTION as a
operating system project? If yes how can we use the concepts?
Answer Posted / neha bhagat
Yes we can. All the information will be stored in encrypted
form in memory. During fetching, it must be first decrypted
by operating system and then can be read.
| Is This Answer Correct ? | 19 Yes | 4 No |
Post New Answer View All Answers
How is RSA used for authentication in practice?
How do digital timestamps support digital signatures?
Has factoring been getting easier?
What is the discrete log problem?
What are the most important attacks on MACs ?
What if the certifying authority's key is lost or compromised?
How does the Clipper chip work?
What is the current status of DSS?
Can RSA be exported from the U.S.?
Is use of DSS covered by any patents?
What is the secure hash algorithm (sha and sha-1)?
Are elliptic curve cryptosystems widely used ?
What is RSAREF?
Are certifying authorities susceptible to attack?
What is Mondex ?