what encryption is used?

Let’s learn what encryption is used. The most accurate or helpful solution is served by Information Security.

There are ten answers to this question.

Best solution

What encryption (if any) is used on electronic credit cards?

Out of curiosity: how do electronic Visa/Master Card debit/credit cards with microchips authenticate a transaction? Are they stupid storage for a key which is simply read by a reader or do they somehow sign the requested transaction details using an internal key which is never revealed? (The latter is my guess how it should be done but I'm not sure if you can expect the chip to have enough computing power)

Answer:

EMV cards and smart cards in general do indeed have an embedded private key and enough horsepower to...

Read more

lampak at Information Security Mark as irrelevant Undo

Other solutions

What type of encryption is used in encryption locks?

Is it possible to use Random key encryption in encryption locks. If yes plz tell me how, i hav created a random key encryption algorithm with implementation. i want to make it as an encryption lock.

Answer:

It is secret

Read more

cool guy 2006 at Yahoo! Answers Mark as irrelevant Undo

Answer:

I think there are two important things. First, if it's a lossless algorithm, create as many test cases...

Read more

Dorin Lazăr at Quora Mark as irrelevant Undo

In encryption, can public/private key be used symmetrically and asymmetrically?

Do you have a good explanation source for how public/private key encryption works? And how does one REALLY get the public key? And what does each end need (in both symmetric & asymmetic if applicable) to do the public/private encryption method?

Answer:

Well a public/private key encryption is called an asymmetric system because the sender and receiver...

Read more

Sufi at Yahoo! Answers Mark as irrelevant Undo

Help me remember which client-side encryption software I used...

I have a bunch of files in a cloud account that I have, at some point, encrypted before uploading them, but now I can't remember what I used to encrypt them. However the file (re-)naming system looks like other people might recognise what software I...

Answer:

My Googlefu says... "Hider2" which is a Mac thing, but I don't use a Mac, so I leave the rest...

Read more

infinitejones at Ask.Metafilter.Com Mark as irrelevant Undo

Why type of Encryption that usually used in sending an e-mail, and login password on website?

i'm doing a research on encryption/decryption techniques, comparison the most commonly used crypthography & wanted to find some information that might help... Thanking in Forward

Answer:

As in the previous answer, the most commonly used encryption for websites is SSL. For email, there are...

Read more

Aimi at Yahoo! Answers Mark as irrelevant Undo

Cryptography: How can encryption be broken if standard methods are used two or more times on the same text?

I have anything but a deep understanding of cryptography.  It appears from what I read that orgaizations like the NSA use powerful computers to undertake brute force attacks, and that the way they know when the succeed is that the output looks like text...

Answer:

In short: layering would make it harder to break that part of the crypto by brute force, but it's probably...

Read more

Michael Hamburg at Quora Mark as irrelevant Undo

Is convergent encryption used by Bitcasa safe?

If some authority wanted to find out all illegal copies of some digital content stored in Bitcasa and their uploaders, would the encryption in place prevent them?

Answer:

Please note that I don't work at Bitcasa, my answer is based only on my IT knowledge. First of all,...

Read more

Vadim Ippolitov at Quora Mark as irrelevant Undo

What are the ways to store passwords in an encrypted manner in a DB and what methods can be used for both encryption and decryption?

I have a username and password. I want to store them in DB in a secured way. I am very new to this, dont know much. Please help.

Answer:

there are three password encryption modules which are rot ,md5 and crypt

Read more

Lordrick Silvester Munuo at Quora Mark as irrelevant Undo

File encryption to a *.zen file.... does anybody know the name of the program used to encrypt files to *.ZEN.?

it was a program I used in 2001 to encrypt some files, and don't remember the name. It encrypted them to *.zen

Answer:

ZEN is a directive-based language to specify arbitrarily complex program executions for performance...

Read more

tennesse... at Yahoo! Answers Mark as irrelevant Undo

Related Q & A:

Just Added Q & A:

Find solution

For every problem there is a solution! Proved by Solucija.

  • Got an issue and looking for advice?

  • Ask Solucija to search every corner of the Web for help.

  • Get workable solutions and helpful tips in a moment.

Just ask Solucija about an issue you face and immediately get a list of ready solutions, answers and tips from other Internet users. We always provide the most suitable and complete answer to your question at the top, along with a few good alternatives below.