Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


why hash functions are not used for encryption but
authentication ?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More Encryption Decryption Interview Questions

What are the disadvantages of public-key cryptography compared with secret-key cryptography?

0 Answers  


What is luc?

0 Answers  


What is meant by 1024, 2048, 5096 bit encryption?

0 Answers   ASD Lab,


What is the Popular Symmetric-Key Encryption Method

0 Answers   HCL,


What key size should be used ?

2 Answers  


What happens if my key is lost ?

1 Answers  


What is the difference between a message authentication code (MAC) and a one-way hash?

0 Answers  


How does one find random numbers for keys ?

1 Answers   TCS,


What is Plaintext?

2 Answers  


What is are "proprietary" and "public" cryptographic algorithms?

0 Answers  


Hello. In Snort, how a digital signature is actually created for the authentication purpose and thereby provides intrusion detection as well as prevention. How the software for IDS/IPS comes to know regarding the threat/vulnerability using digital signature ? Whether any specific language or programming is used or not.

1 Answers  


What are some other public key cryptosystems ?

0 Answers  


Categories
  • Cryptography Algorithms Interview Questions Cryptography Algorithms (52)
  • Digital Certificates Interview Questions Digital Certificates (23)
  • Encryption Decryption Interview Questions Encryption Decryption (77)
  • Ciphers Interview Questions Ciphers (43)
  • Cryptography Protocols Interview Questions Cryptography Protocols (31)
  • Blockchain Interview Questions Blockchain (338)
  • Cryptography General Interview Questions Cryptography General (154)
  • Cryptography AllOther Interview Questions Cryptography AllOther (0)