Top Menu

  • Home
  • Blog
  • Contact us

Main Menu

  • Home
  • Cryptography
  • E-Commerce
  • Cloud computing
Sign in / Join

Login

Welcome! Login in to your account
Lost your password?

Lost Password

Back to login
  • Home
  • Blog
  • Contact us
Nerd Tutorials

Nerd Tutorials

  • Home
  • Cryptography
  • E-Commerce
  • Cloud computing
Home›Author: remshad (Page 6)

Author: remshad

remshad

  • Cryptography
    November 22, 2020
    by remshad

    With the help of a block diagram explain the RSA algorithm for digital signature ?

    Digital signatures are like electronic “fingerprints.” In the form of a coded message, the digital signature securely associates a signer with a document in a ...
    Read More
  • Cryptography
    November 22, 2020
    by remshad

    With the help of block diagram explain DES?

    Issued in 1977 by the National Bureau of Standards (now NIST) as Federal Information Processing Standard (FIPS) 46 Was the most widely used encryption scheme ...
    Read More
  • Cryptography
    November 22, 2020
    by remshad

    Explain an Diffie-hellman key exchange algorithm?

    Purpose is to enable two users to securely exchange a key that can then be used for subsequent symmetric encryption of messages The algorithm is ...
    Read More
  • Cryptography
    November 22, 2020
    by remshad

    What is the RSA algorithm?

    The RSA algorithm is an asymmetric cryptography algorithm; this means that it uses a public key and a private key (i.e two different, mathematically linked keys). As their names suggest, a ...
    Read More
  • Cryptography
    November 22, 2020
    by remshad

    Describe the main applications of Public key cryptography?

    Public-key cryptography, or asymmetric cryptography, is an encryption scheme that uses two mathematically related, but not identical, keys - a public key and a private ...
    Read More
  • Cryptography
    November 22, 2020
    by remshad

    Explain birth day attack ?

    A birthday attack is a type of cryptographic attack that exploits the mathematics behind the birthday problem in probability theory. This attack can be used ...
    Read More
  • Cryptography
    November 22, 2020
    by remshad

    Draw the block diagram of Cipher block chaining mode(CBC) in Block ciphers. Give one of ...

    a block cipher takes a fixed-length block of text of length b  bits and a key as input and produces a b -bit block of ...
    Read More
  • Cryptography
    November 22, 2020
    by remshad

    With a neat diagram explain HMAC algorithm ?

    HMAC algorithm stands for Hashed or Hash based Message Authentication Code. It is a result of work done on developing a MAC derived from cryptographic ...
    Read More
← 1 … 4 5 6

Recent Posts

  • How Compile and build a package to PHP for UBUNTU
  • Explain the requirements of Public key cryptography?
  • State Fermat’s Theorem. Find out the result of 3^12 mod 11 using second version of Fermat’s Theorem.
  • What is ransomware?
  • Text Pre-Processing to Latent Semantic Indexing

Recent Comments

  • sanu on With the help of a block diagram explain the RSA algorithm for digital signature ?
  • a on With the help of a block diagram explain the RSA algorithm for digital signature ?
  • a on With the help of a block diagram explain the RSA algorithm for digital signature ?
  • a on With the help of a block diagram explain the RSA algorithm for digital signature ?

Categories

  • cloud computing
  • Cryptography
  • E-Commerce
  • module 1
  • module 2
  • module 3
  • Python
  • tutorial
  • web datamining
  • Home
  • Blog
  • Contact us
© Copyright Nerd Tutorials. All rights reserved.