Cryptography General Interview Questions
Questions Answers Views Company eMail

What if users of RSA run out of distinct primes?

TCS,

675

Are certifying authorities susceptible to attack?

TCS,

664

How are certificates used?

TCS,

654

Should a public key or private key be shared among users?

TCS,

627

What key management issues are involved in public-key cryptography?

TCS,

620

What role does NIST play in cryptography?

TCS,

673

How can signatures remain valid beyond the expiration dates of their keys, or, How do you verify a 20-year-old signature?

TCS,

633

What happens if my private key is compromised?

TCS,

647

Who issues certificates and how?

TCS,

676

Does RSA help detect altered documents and transmission errors?

TCS,

711

What is authentication? What is a digital signature?

TCS,

654

Why is Clipper controversial?

TCS,

673

Who needs a key?

TCS,

706

How is RSA used for authentication in practice?

TCS,

704

How much extra message length is caused by using RSA?

TCS,

668


Post New Cryptography General Questions

Un-Answered Questions { Cryptography General }

What are the most important attacks on MACs ?

1668


How do I find someone else's public key?

674


What are the advantages and disadvantages of public-key cryptography over secret-key cryptography?

619


What is SET ?

1680


What is the factoring problem ?

1622


Who issues certificates and how?

676


What is cryptanalysis ?

1623


How do elliptic curve cryptosystems compare with other cryptosystems ?

1508


What is SecurID ?

1640


How does the Clipper chip work?

727


What are visual secret sharing schemes?

629


What is authentication? What is a digital signature?

654


Has factoring been getting easier?

697


What is shamirs secret sharing scheme?

672


What are the prospects for a theoretical breakthrough in the discrete log problem ?

1581