Can we do the project in ENCRYPTION AND DECRYPTION as a
operating system project? If yes how can we use the concepts?
Answer Posted / neha bhagat
Yes we can. All the information will be stored in encrypted
form in memory. During fetching, it must be first decrypted
by operating system and then can be read.
| Is This Answer Correct ? | 19 Yes | 4 No |
Post New Answer View All Answers
What are rsa digital signatures?
What are the best discrete logarithm methods in use today ?
How can signatures remain valid beyond the expiration dates of their keys, or, How do you verify a 20-year-old signature?
What is a linear feedback shift register?
What is RSAREF?
What is a stream cipher?
What are the prospects for a theoretical breakthrough in the discrete log problem ?
What is authentication? What is a digital signature?
Which cryptologic mechanisms can be used to protect integrity?
Why is Clipper controversial?
Has factoring been getting easier?
Can users of rsa run out of distinct primes?
What are covert channels ?
How much extra message length is caused by using RSA?
What is IEEE P1363 ?