Encryption Decryption Interview Questions
Questions Answers Views Company eMail

what is trapdoor and how does it works?

1682

why hash functions are not used for encryption but authentication ?

1537

what are some of the current encryption schemes?

2735

what is pretty good privacy?

1643

What is nonlinear cryptography?

6007

What is public-key cryptography ?

TCS,

1584

What is secret-key cryptography ?

3719

What are the advantages and disadvantages of public key cryptography compared with secret key cryptography ?

1 9240

What is exhaustive key search ?

1828

What are some other public key cryptosystems ?

1760

What is key management ?

Wipro,

1860

What key size should be used ?

2 4040

How does one find random numbers for keys ?

TCS,

1 3314

What is the life cycle of a key ?

1 3603

Who needs a key pair ?

3 5129


Post New Encryption Decryption Questions

Un-Answered Questions { Encryption Decryption }

What is are "proprietary" and "public" cryptographic algorithms?

1718


What is an algorithm?

2034


What information can be obtained from encrypted file?

1714


What are the ecb and cbc modes?

671


What is the rabin signature scheme?

627






WHAT IS A SAMPLE USER INTERFACE OF DES ENCRYPTION/DECRYPTION PROJECT?

2025


What are the disadvantages of public-key cryptography compared with secret-key cryptography?

582


Do digital signatures help detect altered documents and transmission errors?

779


What are "stream" and "block" ciphers?

1667


What are the counter and pcbc modes?

655


How can we use quantum properties in cryptography ?

1490


What are the advantages of public-key cryptography compared with secret-key cryptography?

592


What is exhaustive key search ?

1828


Is there a limit on the file size or on the number of encrypted files?

1679


What is secret-key cryptography ?

3719