Ask
Search
Ask Question
Login
×
×
Welcome back.
and 2 others joined a min ago.
Continue with Google
Continue with email
Read
Write
Sort by: updates
updates
views
bookmarks
followers
votes
answers
2
votes
1
answer
11k
views
1
answer
Write short note on email security
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
5
votes
1
answer
19k
views
1
answer
Explain working of Kerberos.
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
2
votes
1
answer
20k
views
1
answer
How does PGP achieve confidentially and authentication in emails?
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
2
votes
1
answer
14k
views
1
answer
Give the format of X.509 digital certificate and explain the use of a digital signature in it.
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
0
votes
1
answer
6.5k
views
1
answer
E-mail Security.
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
2
votes
1
answer
10k
views
1
answer
Kerberos system and authentication in distributed system.
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
1
vote
1
answer
7.8k
views
1
answer
Explain cryptography hash function criteria and compare MD-5 and SHA-1.
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
1
vote
1
answer
11k
views
1
answer
Explain different authentication methods and protocols.
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
0
votes
1
answer
4.9k
views
1
answer
What is message digest? Explain HMAC algorithm?
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
1
vote
1
answer
10k
views
1
answer
What is a digital signature. Explain any digital signature algorithm in detail.
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
2
votes
1
answer
10k
views
1
answer
Distinguish between attack, vulnerability.
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
14
votes
1
answer
63k
views
1
answer
Short note on Digital Signature.
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
8
votes
1
answer
78k
views
1
answer
Explain Diffie Hellman key exchange algorithm with example.
data compression and encryption
updated
6.1 years ago
by
teamques10
★
70k
4
votes
1
answer
13k
views
1
answer
A and B decide to use Diffie Hellman algorithm to share a key. They choose p=23 and g=5 as the public parameters. The secret keys are 6 and 15 respectively. Compute the secret key that they share.
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
3
votes
2
answers
10k
views
2
answers
Elaborate the steps of key generation using RSA algorithm.
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
0
votes
1
answer
3.3k
views
1
answer
Explain how a key is shared between two parties using Diffie-Hellman by exchange algorithm. What is the drawback of this algorithm?
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
3
votes
1
answer
14k
views
1
answer
what is the cipher text when you encrypt message m=10, using the public key?
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
4
votes
1
answer
7.2k
views
1
answer
Key generation in IDEA.
cryptography and system security
updated
6.1 years ago
by
parviagrawal100
•
0
4
votes
1
answer
12k
views
1
answer
Explain working of DES detailing the Fiestel structure.
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
1
vote
1
answer
13k
views
1
answer
Using the RSA algorithm, encrypt the following:
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
0
votes
1
answer
3.4k
views
1
answer
Does public key infrastructure use symmetric or asymmetric encryption? Explain.
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
0
votes
1
answer
7.7k
views
1
answer
What is Feistel Cipher?
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
1
vote
1
answer
6.4k
views
1
answer
Short note on RSA algorithm.
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
0
votes
1
answer
9.5k
views
1
answer
If generator g=2 and n or p=11, using Diffie-hellman algorithm solve the following:
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
0
votes
1
answer
12k
views
1
answer
Short note on Multiple DES.
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
<prev
• 28,287 results • page 684 of 1132 •
next >
×
Top contributors for
*** MISSING ***
×
Merge
*** MISSING ***
to
Community
Users
Levels
Badges
Content
All posts
Tags
Dashboard
Company
About
Team
Privacy
Submit question paper solutions and earn money