Cryptography General Interview Questions
Questions Answers Views Company eMail

What if users of RSA run out of distinct primes?

TCS,

650

Are certifying authorities susceptible to attack?

TCS,

638

How are certificates used?

TCS,

633

Should a public key or private key be shared among users?

TCS,

600

What key management issues are involved in public-key cryptography?

TCS,

602

What role does NIST play in cryptography?

TCS,

653

How can signatures remain valid beyond the expiration dates of their keys, or, How do you verify a 20-year-old signature?

TCS,

605

What happens if my private key is compromised?

TCS,

619

Who issues certificates and how?

TCS,

651

Does RSA help detect altered documents and transmission errors?

TCS,

688

What is authentication? What is a digital signature?

TCS,

615

Why is Clipper controversial?

TCS,

649

Who needs a key?

TCS,

688

How is RSA used for authentication in practice?

TCS,

678

How much extra message length is caused by using RSA?

TCS,

648


Post New Cryptography General Questions

Un-Answered Questions { Cryptography General }

Why use RSA rather than DES?

662


What is SecurPC ?

1733


What is the significance of factoring in cryptography?

643


Can DES be exported from the U.S.?

588


What are the best discrete logarithm methods in use today ?

1685






What is the RSA Factoring Challenge?

740


Why is Clipper controversial?

649


What are alternatives to RSA?

655


What is DNA computing ?

2957


What is privacy ?

1836


What is the secure hash algorithm (sha and sha-1)?

722


What is PKCS ?

1858


Which two cryptographic mechanisms provide confidentiality?

1602


How is RSA used for encryption in practice?

705


What is SSH ?

1618