Cryptography General Interview Questions
Questions Answers Views Company eMail

What if users of RSA run out of distinct primes?

TCS,

583

Are certifying authorities susceptible to attack?

TCS,

581

How are certificates used?

TCS,

578

Should a public key or private key be shared among users?

TCS,

528

What key management issues are involved in public-key cryptography?

TCS,

532

What role does NIST play in cryptography?

TCS,

597

How can signatures remain valid beyond the expiration dates of their keys, or, How do you verify a 20-year-old signature?

TCS,

547

What happens if my private key is compromised?

TCS,

544

Who issues certificates and how?

TCS,

590

Does RSA help detect altered documents and transmission errors?

TCS,

612

What is authentication? What is a digital signature?

TCS,

541

Why is Clipper controversial?

TCS,

597

Who needs a key?

TCS,

612

How is RSA used for authentication in practice?

TCS,

600

How much extra message length is caused by using RSA?

TCS,

585


Post New Cryptography General Questions

Un-Answered Questions { Cryptography General }

What improvements are likely in factoring capability ?

1453


How does the length of a hash value affect security?

533


What is Mondex ?

1606


What are some other cryptography specifications ?

1557


How is rsa used for authentication in practice? What are rsa digital signatures?

531






What are covert channels ?

2176


Can DES be exported from the U.S.?

528


What is PSS/PSS-R ?

2222


What role does NIST play in cryptography?

597


What is a digital time-stamping service?

590


What is authentication? What is a digital signature?

541


What are visual secret sharing schemes?

554


What is a birthday attack?

575


What is a compression function?

602


What is a CSU, or, How do certifying authorities store their private keys?

544