Top Menu

  • Home
  • Blog
  • Contact us

Main Menu

  • Home
  • Cryptography
  • E-Commerce
  • Cloud computing
Sign in / Join

Login

Welcome! Login in to your account
Lost your password?

Lost Password

Back to login
  • Home
  • Blog
  • Contact us
Nerd Tutorials

Nerd Tutorials

  • Home
  • Cryptography
  • E-Commerce
  • Cloud computing
Home›Category: "Cryptography" (Page 3)

Cryptography

  • Explain birth day attack ?

    Cryptography
    November 22, 2020
    by remshad
    A birthday attack is a type of cryptographic attack that exploits the mathematics behind the birthday problem in probability theory. This attack can be used to abuse communication between two ...
    Read More
  • Draw the block diagram of Cipher block chaining mode(CBC) in Block ciphers. Give one of ...

    Cryptography
    November 22, 2020
    by remshad
    a block cipher takes a fixed-length block of text of length b  bits and a key as input and produces a b -bit block of ciphertext. If the amount of ...
    Read More
  • With a neat diagram explain HMAC algorithm ?

    Cryptography
    November 22, 2020
    by remshad
    HMAC algorithm stands for Hashed or Hash based Message Authentication Code. It is a result of work done on developing a MAC derived from cryptographic hash functions. HMAC is a ...
    Read More
← 1 2 3

Recent Posts

  • Explain the requirements of Public key cryptography?
  • State Fermat’s Theorem. Find out the result of 3^12 mod 11 using second version of Fermat’s Theorem.
  • What is ransomware?
  • Text Pre-Processing to Latent Semantic Indexing
  • Information Retrieval and Web Search

Recent Comments

  • sanu on With the help of a block diagram explain the RSA algorithm for digital signature ?
  • a on With the help of a block diagram explain the RSA algorithm for digital signature ?
  • a on With the help of a block diagram explain the RSA algorithm for digital signature ?
  • a on With the help of a block diagram explain the RSA algorithm for digital signature ?

Categories

  • cloud computing
  • Cryptography
  • E-Commerce
  • module 1
  • module 2
  • module 3
  • Python
  • web datamining
  • Home
  • Blog
  • Contact us
© Copyright Nerd Tutorials. All rights reserved.