Top Menu

  • Home
  • Blog
  • Contact us

Main Menu

  • Home
  • Cryptography
  • E-Commerce
  • Cloud computing
Sign in / Join

Login

Welcome! Login in to your account
Lost your password?

Lost Password

Back to login
  • Home
  • Blog
  • Contact us
Nerd Tutorials

Nerd Tutorials

  • Home
  • Cryptography
  • E-Commerce
  • Cloud computing
Home›Category: "Cryptography"

Cryptography

  • Explain about Message Authentication Code algorithm.?

    Cryptography
    November 23, 2020
    by remshad
    In cryptography, a message authentication code, sometimes known as a tag, is a short piece of information used to authenticate a message—in other words, to confirm that the message came ...
    Read More
  • Explain RSA algorithm with example ?

    Cryptography
    November 23, 2020
    by remshad
    RSA (Rivest–Shamir–Adleman) is an algorithm used by modern computers to encrypt and decrypt messages. It is an asymmetric cryptographic algorithm. Asymmetric means that there are two different keys. This is also called public key ...
    Read More
  • Explain Diffie Hellman key exchange algorithm ?

    Cryptography
    November 23, 2020
    by remshad
    Diffie–Hellman key exchange is a method of securely exchanging cryptographic keys over a public channel  Purpose is to enable two users to securely exchange a key that can then be ...
    Read More
  • What is Cipher Feed Back mode (CFB)?

    Cryptography
    November 23, 2020
    by remshad
    Ciphertext feedback (CFB) is a mode of operation for a block cipher. In contrast to the cipher block chaining (CBC) mode, which encrypts a set number of bits of plaintext at a time, it is at times ...
    Read More
  • Explain the concept of public key cryptography?

    Cryptography
    November 23, 2020
    by remshad
    Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys, (which may be public to widely) , and private keys, (which will be known ...
    Read More
  • Describe the various components used for message integrity in cryptography ?

    Cryptography
    November 23, 2020
    by remshad
    The types of functions that may be used to produce an authenticator may be grouped into three classes Hash function A function that maps a message of any length into ...
    Read More
  • Explain various digital signature schemes with suitable diagram?

    Cryptography
    November 23, 2020
    by remshad
    A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. A valid digital signature, where the prerequisites are satisfied, gives a recipient very strong ...
    Read More
  • Discuss the four types of transformations used by AES?

    Cryptography
    November 23, 2020
    by remshad
    In AES, all operations are performed on 8-bit bytes. In particular, the arithmetic operations of addition, multiplication, and division are performed over the finite field GF(28 ). Section 5.6 discusses ...
    Read More
  • List out and explain the components of block ciphers in symmetric key encryption?

    Cryptography
    November 23, 2020
    by remshad
    Block Cipher A block cipher is one in which a block of plaintext is treated as a whole and used to produce a ciphertext block.   Typically, a block size of ...
    Read More
  • List out criteria of a cryptographic hash function ?

    Cryptography
    November 23, 2020
    by remshad
    A hash function H accepts a variable-length block of data M as input and produces a fixed-size hash value as output h = H(M) Principal objective of hash function  is ...
    Read More
1 2 →

Recent Posts

  • Text Pre-Processing to Latent Semantic Indexing
  • Information Retrieval and Web Search
  • Differentiate Regex patterns and Regex modifiers. Explain any 3 uses of regular expression with relevant example.
  • Explain the concept of inheritance in Python with suitable examples.
  • Write a python program to search a word in a file and replace with another word

Recent Comments

    Categories

    • cloud computing
    • Cryptography
    • E-Commerce
    • Python
    • web datamining
    • Home
    • Blog
    • Contact us
    © Copyright Nerd Tutorials. All rights reserved.