Top Menu

  • Home
  • Blog
  • Contact us

Main Menu

  • Home
  • Cryptography
  • E-Commerce
  • Cloud computing
Sign in / Join

Login

Welcome! Login in to your account
Lost your password?

Lost Password

Back to login
  • Home
  • Blog
  • Contact us
Nerd Tutorials

Nerd Tutorials

  • Home
  • Cryptography
  • E-Commerce
  • Cloud computing
Home›Category: "Cryptography"

Cryptography

  • Explain the requirements of Public key cryptography?

    Cryptography, module 3
    February 11, 2021
    by remshad
    in public key cryptography there should be two key called private key and public key private key kept in secret and public key put in public in public key cryptography ...
    Read More
  • State Fermat’s Theorem. Find out the result of 3^12 mod 11 using second version of ...

    Cryptography, module 2
    February 11, 2021
    by remshad
    Fermat's states that if p is a prime number and a is an integer not divisible by p then a^(p-1)=1(mod p) or the modification of fermat's theorem is that a^p=a ...
    Read More
  • What is ransomware?

    Cryptography, module 1
    February 11, 2021
    by remshad
    Ransomware is a type of malware which restrict the access to the infected system in some way and demand a ransom to lift the restriction. Ransomware usually installed when clicking ...
    Read More
  • Explain about Message Authentication Code algorithm.?

    Cryptography
    November 23, 2020
    by remshad
    In cryptography, a message authentication code, sometimes known as a tag, is a short piece of information used to authenticate a message—in other words, to confirm that the message came ...
    Read More
  • Explain RSA algorithm with example ?

    Cryptography
    November 23, 2020
    by remshad
    RSA (Rivest–Shamir–Adleman) is an algorithm used by modern computers to encrypt and decrypt messages. It is an asymmetric cryptographic algorithm. Asymmetric means that there are two different keys. This is also called public key ...
    Read More
  • Explain Diffie Hellman key exchange algorithm ?

    Cryptography
    November 23, 2020
    by remshad
    Diffie–Hellman key exchange is a method of securely exchanging cryptographic keys over a public channel  Purpose is to enable two users to securely exchange a key that can then be ...
    Read More
  • What is Cipher Feed Back mode (CFB)?

    Cryptography
    November 23, 2020
    by remshad
    Ciphertext feedback (CFB) is a mode of operation for a block cipher. In contrast to the cipher block chaining (CBC) mode, which encrypts a set number of bits of plaintext at a time, it is at times ...
    Read More
  • Explain the concept of public key cryptography?

    Cryptography
    November 23, 2020
    by remshad
    Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys, (which may be public to widely) , and private keys, (which will be known ...
    Read More
  • Describe the various components used for message integrity in cryptography ?

    Cryptography
    November 23, 2020
    by remshad
    The types of functions that may be used to produce an authenticator may be grouped into three classes Hash function A function that maps a message of any length into ...
    Read More
  • Explain various digital signature schemes with suitable diagram?

    Cryptography
    November 23, 2020
    by remshad
    A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. A valid digital signature, where the prerequisites are satisfied, gives a recipient very strong ...
    Read More
1 2 3 →

Recent Posts

  • Explain the requirements of Public key cryptography?
  • State Fermat’s Theorem. Find out the result of 3^12 mod 11 using second version of Fermat’s Theorem.
  • What is ransomware?
  • Text Pre-Processing to Latent Semantic Indexing
  • Information Retrieval and Web Search

Recent Comments

  • sanu on With the help of a block diagram explain the RSA algorithm for digital signature ?
  • a on With the help of a block diagram explain the RSA algorithm for digital signature ?
  • a on With the help of a block diagram explain the RSA algorithm for digital signature ?
  • a on With the help of a block diagram explain the RSA algorithm for digital signature ?

Categories

  • cloud computing
  • Cryptography
  • E-Commerce
  • module 1
  • module 2
  • module 3
  • Python
  • web datamining
  • Home
  • Blog
  • Contact us
© Copyright Nerd Tutorials. All rights reserved.