Can we do the project in ENCRYPTION AND DECRYPTION as a
operating system project? If yes how can we use the concepts?
Answer / neha bhagat
Yes we can. All the information will be stored in encrypted
form in memory. During fetching, it must be first decrypted
by operating system and then can be read.
Is This Answer Correct ? | 19 Yes | 4 No |
How much extra message length is caused by using RSA?
Who are the escrow agencies?
What is primality testing ?
What are the most important attacks on MACs ?
What are the advantages and disadvantages of public-key cryptography over secret-key cryptography?
What is PKCS ?
Can RSA be exported from the U.S.?
What is identification ?
How are certificates used?
Who issues certificates and how?
Why is Clipper controversial?
What are some of the basic types of cryptanalytic attack ?