Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What key size should be used ?

Answer Posted / dalgin augustinr

Key size can be set depend up on the purpose of use. key
can be created with 256, 512,1024,2048...
256 and 512 are already cracked and its
not too secure.
1024 is an effective and secure key size that we can use

Is This Answer Correct ?    5 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

A company wants to transmit data over the telephone, but it is concerned that its phones may be tapped. All of its data is transmitted as four-digit integers. It has asked you to write a program that will encrypt its data so that the data may be transmitted more securely. Your script should read a four digit integer entered by the user in a prompt dialog and encrypt it as follows: Replace each digit by (the sum of that digit plus 7) modulus 10. Then swap the first digit with the third, and swap the second digit with the fourth. Then output XHTML text that displays the encrypted integer.

3516


How can we use quantum properties in cryptography ?

1834


How Encoding is different from Encryption?

954


What are "stream" and "block" ciphers?

2003


What is the elgamal cryptosystem?

1026


What is the difference between a message authentication code (MAC) and a one-way hash?

3853


What is are "proprietary" and "public" cryptographic algorithms?

2011


What is probabilistic encryption?

957


What is the difference between Kryptel and Silver Key?

2096


What is merkles tree signature scheme?

891


What are knapsack cryptosystems?

927


Actual role of cryptography is data security .Explain with real world example?

1875


What is a zed encoder? How does it work?

2769


How is an s-box value of AES can be modified? How is it done?

1834


What is cryptographic synchronisation?

2198