what is cryptography?
Answers were Sorted based on User's Feedback
Answer / guest
The science and art of manipulating messages in order to
make them secure is called cryptography......
types are
symmetric key cryptography and asymmetric key cryptography
1)symmetric key cryptography
same key is used for encryption and decryption
eg :DES IDEA AES
2)Asymmetric key:
public key is used for both encryption and decryption
eg:RSA Difere Hellman
| Is This Answer Correct ? | 6 Yes | 1 No |
Answer / adu
cryptography is the process of sending data in a secure
manner in a network by using encryption and decryption
techniques. various algorithms are available for encryption
and decryption, for example RSA algorithm.
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / adu
cryptography is the process of sending data in a secure
manner in a network by using encryption and decryption
techniques. various algorithms are available for encryption
and decryption, for example RSA algorithm.
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / janu
Cryptogarphy is the art and science of Converting the
Confidential Messages from Readable format to Unreadable
Format. It is mainly used to sending and receiving an
messages between the Sender and Receiver. There are two
types of Cryptography.
1. Symmetric: Same Key(Public Key) is used for both
Encryption( Unreadable fromat) and Decryption(Readable
Format).
Both sender and Receiver Know this Public key.
2. ASymmetric: Different Key(Private Key) is used for both
Encryption( Unreadable fromat) and Decryption(Readable
Format.
sender Should send a msg to the Receiver with one
key.That's known by Sender alone. The Receiver should use
some Algorithms to find that key and Decrypted the msg.
This type of cryptography is more confidential than the
Symmetric cryptography.
| Is This Answer Correct ? | 2 Yes | 0 No |
Can we do the project in ENCRYPTION AND DECRYPTION as a operating system project? If yes how can we use the concepts?
What is Fortezza ?
What is a PKI ?
Is use of DSS covered by any patents?
What are alternatives to RSA?
What is IEEE P1363 ?
What are the best discrete logarithm methods in use today ?
Why is Clipper controversial?
At what point does an attack become practical ?
What if the certifying authority's key is lost or compromised?
What is SecurPC ?
What is quantum computing ?