what encryption is used?
Let’s learn what encryption is used. The most accurate or helpful solution is served by Information Security.
There are ten answers to this question.
Best solution
Out of curiosity: how do electronic Visa/Master Card debit/credit cards with microchips authenticate a transaction? Are they stupid storage for a key which is simply read by a reader or do they somehow sign the requested transaction details using an internal key which is never revealed? (The latter is my guess how it should be done but I'm not sure if you can expect the chip to have enough computing power)
Answer:
EMV cards and smart cards in general do indeed have an embedded private key and enough horsepower to...
lampak at Information Security Mark as irrelevant Undo
Other solutions
Is it possible to use Random key encryption in encryption locks. If yes plz tell me how, i hav created a random key encryption algorithm with implementation. i want to make it as an encryption lock.
cool guy 2006 at Yahoo! Answers Mark as irrelevant Undo
The algorithm is a loss-less encryption algorithm.
Answer:
I think there are two important things. First, if it's a lossless algorithm, create as many test cases...
Dorin LazÄr at Quora Mark as irrelevant Undo
Do you have a good explanation source for how public/private key encryption works? And how does one REALLY get the public key? And what does each end need (in both symmetric & asymmetic if applicable) to do the public/private encryption method?
Answer:
Well a public/private key encryption is called an asymmetric system because the sender and receiver...
Sufi at Yahoo! Answers Mark as irrelevant Undo
I have a bunch of files in a cloud account that I have, at some point, encrypted before uploading them, but now I can't remember what I used to encrypt them. However the file (re-)naming system looks like other people might recognise what software I...
Answer:
My Googlefu says... "Hider2" which is a Mac thing, but I don't use a Mac, so I leave the rest...
infinitejones at Ask.Metafilter.Com Mark as irrelevant Undo
i'm doing a research on encryption/decryption techniques, comparison the most commonly used crypthography & wanted to find some information that might help... Thanking in Forward
Answer:
As in the previous answer, the most commonly used encryption for websites is SSL. For email, there are...
Aimi at Yahoo! Answers Mark as irrelevant Undo
I have anything but a deep understanding of cryptography. It appears from what I read that orgaizations like the NSA use powerful computers to undertake brute force attacks, and that the way they know when the succeed is that the output looks like text...
Answer:
In short: layering would make it harder to break that part of the crypto by brute force, but it's probably...
Michael Hamburg at Quora Mark as irrelevant Undo
If some authority wanted to find out all illegal copies of some digital content stored in Bitcasa and their uploaders, would the encryption in place prevent them?
Answer:
Please note that I don't work at Bitcasa, my answer is based only on my IT knowledge. First of all,...
Vadim Ippolitov at Quora Mark as irrelevant Undo
I have a username and password. I want to store them in DB in a secured way. I am very new to this, dont know much. Please help.
Lordrick Silvester Munuo at Quora Mark as irrelevant Undo
it was a program I used in 2001 to encrypt some files, and don't remember the name. It encrypted them to *.zen
Answer:
ZEN is a directive-based language to specify arbitrarily complex program executions for performance...
tennesse... at Yahoo! Answers Mark as irrelevant Undo
Related Q & A:
- What Technology Is Used In Mechanical Engineering?Best solution by answers.yahoo.com
- What is Energy used for?Best solution by Yahoo! Answers
- What are plug-ins and what are they used for?Best solution by Sound Design
- What is oxygen used for?Best solution by Yahoo! Answers
- What is quartz used for?Best solution by wiki.answers.com
Just Added Q & A:
- How many active mobile subscribers are there in China?Best solution by Quora
- How to find the right vacation?Best solution by bookit.com
- How To Make Your Own Primer?Best solution by thekrazycouponlady.com
- How do you get the domain & range?Best solution by ChaCha
- How do you open pop up blockers?Best solution by Yahoo! Answers
For every problem there is a solution! Proved by Solucija.
-
Got an issue and looking for advice?
-
Ask Solucija to search every corner of the Web for help.
-
Get workable solutions and helpful tips in a moment.
Just ask Solucija about an issue you face and immediately get a list of ready solutions, answers and tips from other Internet users. We always provide the most suitable and complete answer to your question at the top, along with a few good alternatives below.