Can we do the project in ENCRYPTION AND DECRYPTION as a
operating system project? If yes how can we use the concepts?
Answer Posted / neha bhagat
Yes we can. All the information will be stored in encrypted
form in memory. During fetching, it must be first decrypted
by operating system and then can be read.
| Is This Answer Correct ? | 19 Yes | 4 No |
Post New Answer View All Answers
What is a birthday attack?
What are elliptic curves ?
What are pseudo-collisions?
What is safer?
What are the alternatives to rsa?
What is the legal status of documents signed with digital signatures?
What is SET ?
Who issues certificates and how?
What are the advantages and disadvantages of public-key cryptography over secret-key cryptography?
Which cryptographic mechanism provides non-repudiation?
Should a public key or private key be shared among users?
What is the role of the United States government in cryptography ?
Are elliptic curve cryptosystems widely used ?
What are covert channels ?
What is the GSS-API ?