Can we do the project in ENCRYPTION AND DECRYPTION as a
operating system project? If yes how can we use the concepts?
Answer Posted / neha bhagat
Yes we can. All the information will be stored in encrypted
form in memory. During fetching, it must be first decrypted
by operating system and then can be read.
| Is This Answer Correct ? | 19 Yes | 4 No |
Post New Answer View All Answers
What is iKP ?
What if users of RSA run out of distinct primes?
What is the secure hash algorithm (sha and sha-1)?
What are the best factoring methods in use today ?
Which cryptographic mechanism provides non-repudiation?
What are the best discrete logarithm methods in use today ?
How is cryptography applied ?
What are visual secret sharing schemes?
What is a birthday attack?
What is authentication? What is a digital signature?
What is Fortezza ?
What is S/MIME ?
Which is easier, factoring or discrete log?
What happens if I lose my private key?
Is DSS secure?