Are you an expert in this area? Share your knowledge and earn expert points by giving answers or rating people's questions and answers! This section of FAQS.ORG is not sanctioned in any way by FAQ authors or maintainers.
Questions strongly related to this FAQ:
 I am working in Lotus Notes environment. And one of our senior consultant insist to... by Artem (2/17/2004)
 Which Universities in New York/New Jersey area offer degrees in cryptology? by Casey (1/7/2004)
 From which/what hash function/s does SHA0 and SHA1 derived??
I am just wondering... by Praveen Gauravaram (1/7/2004)
 I have encrypted a file using OS/390 Intergrated Cryptographic which I now wish to decrypt... by Ruth (2/8/2005)
 What's the current status of the RSA patent? http://www.cyberlaw.com/rsa.html says that it... by Ricardo Dalcorsso Fodra (1/30/2004)
 How does Jean include a digital signature? What key does Jean use to encrypt the entire... by athan (11/23/2003)
 What is a zed encoder? How does it work? by chrissy (7/4/2005)
 Hello Dear
I am new one here. I have written an algorithm for cipher Text... by Rafiullah Arain (6/3/2004)
 what is cryptography by emmo (7/7/2005)
 n=p*q where p,q are two large primes but
I can find p and q if I know n
... by Duy Son (11/22/2003)
 I am prasad and i am very interested in cryptanalysis. I am confusing with keys.
what a... by prasad (1/15/2004)
 regarding one time pads,can someone show with an example how, if the same pad is used... by suhas (1/15/2004)
 Dear All,
I have a problem. I would like to know if is possible to decipher the following... by Gaia (1/15/2004)
 What is cryptography and encryption? what references can I start with to learn cryptograph... by sano (7/3/2003)
 Should a cryptographic product manufacturer try to develop an "all in one" product that... by jasmine (6/6/2004)
 What is cryptology? Cryptography? Plaintext? Ciphertext? Encryption? Key? by gupta (2/10/2004)
 meaning of apostrophies in ciphers  ideas? by ephemeral (4/6/2004)
 what is trapdoor and how does it works? by gee (12/25/2004)
 which language is most suitable for implementing cryptography. why java is better that c... by kala (1/12/2004)
 what is cryptography by prasad (2/11/2004)
 I am a graduate student looking to pursue a Ph.D., maybe in the area of cryptography.... by Branden (4/13/2004)
 What are the properties of product ciphers? by shah (9/26/2003)
 I did not get the moto behind public key encryption. Actually i have confusion of how
... by jitu (2/12/2004)
 What's the difference between the RSA and DiffieHellman schemes?
by kutti (4/15/2004)
 Windows Cryptography Problem Am using RSA Key Exchange algorithm(CALG_RSA_KEYX ) with... by vedprakash (7/1/2003)
 What are some network security issues by Ro (8/5/2003)
 Actually what is the difference between encryption and hashing? by Becki (4/3/2004)
 what is cryptography by abc (7/1/2003)
 Just curious if anyone has heard of a progressive shift method. I was fiddling... by CrypKid (6/25/2004)
 What is private key cryptography and how we compare it with public key cryptography... by petrti (9/30/2003)
 I am a new PhD student,my research topic is about Creyptography I need the first step how... by Marie (8/12/2003)
 why public key cryptography
by xyz (6/14/2004)
 how can we use quantum properties in cryptography ? by kanchan (7/14/2003)
 I have a code using fibonacci with every letter individually encoded, any ideas how to... by lisette (12/11/2003)
 what are some of the current encryption schemes? by meg (10/9/2003)
 WHAT IS THE BASIC COMBINATIONS IN PRIVATE KEY TO SEND AND RECEIVE MESSAGE by krishnan (2/4/2004)
 If I had an unbreakable code what use could I have of it? by woj (11/15/2005)
 What is meant by Cryptography ? by ram (12/25/2003)
 what is pretty good privacy? by mohan (7/15/2003)
 · What is the impact of a single bit error in received cipher text on the decryptio... by krishna singh (6/23/2006)
 i am a PhD student doing research in steganography. can any of you help me out in getting... by sajjan (10/11/2003)
 why hash functions are not used for encryption but authentication by bab (8/16/2003)
 want to the problems of Old Methods of encryption and Modern ones>
by Shapna (1/28/2004)
 Does the algorithm maintain its characteristics whatever it implemented on (machines or... by Sam Sung (4/9/2004)
 I would love to know more about all kinds of secret languages. How can I learn more and... by skye (4/27/2004)
 i want 2 understand some concepts :
prp(pseudorandom permutaion),
prg(pseudorandom... by shir (12/16/2003)
 role of cryptography is data security .Explain with real world example?. how do peoples in... by Sathasivam (8/26/2003)
 where or how can I learn to encrypt?
by corwin (12/20/2003)
 I am totally new to the field on cryptography but want to be a professional in this... by Mohd Fahad Alam (3/4/2004)
 When a document has been encrypted with say,128 bit encryption, what does that mean? by NuclearDachshund (8/9/2003)
 can anyone tell me the cryptography program codes in c or c++ by vicky (3/22/2004)
 When a site is not encripted, like an intranet, how can I get the right password? by Jam (3/7/2004)
 What is the difference between a message authentication code(MAC) and a oneway hash... by PiGHead (3/6/2004)
 does the mere publication of a paper on a theoretical attack on an algorithm imply that it... by suren (12/17/2003)
 when quantum laws are applied only when distributing the key then how is quantum cryptogra... by rashed (9/19/2006)
 In a fictional computer network, all the users are required to have a password from the... by Tone (7/16/2004)
 What is cryptography by MRUNAL (7/25/2003)
 Here i have my data in Visual Foxpro and in this data i have a column whose data is in... by Tarun (7/1/2003)
 whats cryptanalysis
by vaibs (12/7/2003)
 what is the disadvantage of cryptography? by c.k.dhinakarraj (8/20/2003)
 how is an sbox value of AES can be modified? how is it done? by jayashree (3/15/2004)
 please give me a list of algorithms for multiple key cryptographic systems by lakshmi (7/19/2007)
 What is meant by 1024, 2048, 5096 bit encription? by batty@surrealestate.com (2/2/2004)
 sir, i want to know what exactly is the problem in the following syntax:
public key =(a... by pal (10/1/2004)
 Can i know the difference of Private key and Secret key? Is Privatekey encryption same as... by Kenny (10/7/2003)
 Dear All,
I have certain questions related to certain Cryptographic algorithms. Would... by Mihir75 (11/26/2003)
 I am trying to figure out a cryptarithm problem. You can only use the numbers 09 and each... by fishlover (11/25/2003)
 EXPLAIN IN BRIEF THE BASIC OF MATHEMATICAL CRYPTOGRAPHY; by gopal (2/4/2004)
Questions somewhat related to this FAQ:
 how hash algorithm works? by ashu (3/28/2006)
 In a Digital Signature Algorithm(DSA) it is said that if s=0 then we should change the... by DJ (11/24/2005)
 how is cryptology related to mathematics by cripcrap (1/31/2004)
 How do asymetrical cyphers work mathmatically speaking. Can someone please show me... by Flunky (11/14/2003)
 What is "dining cryptographers problem solution or implementation in Java code"? by pallavi (9/8/2003)
 I have something that nee3ds encoding and I have no clue how / what to do. The message to... by Nic (4/14/2004)
 It there a commercially available Ethernet encryptor available that operates on a true... by David (6/2/2004)
 how is quantum cryptography different from others forms? by sachin sah (9/4/2003)
 What is nonlinear cryptography? by antony5 (7/7/2003)
 what is cryptography? by dilu (1/27/2004)
 How do you add more to the formula? by Jess (9/2/2003)
 I see 10 10 ALL the time on my phones, computer, VCR, alarm clock, watch, flight times....... by steve (4/17/2004)
 Describe how to form (at the sender end) and then verify (at the receiver end)? by hk2000peter (11/2/2003)
 I have to do a 7 page research report on Crypotography and i have no idea what it is. Any... by LOTR (11/29/2003)
 how can i store large variables,say 32digit binary integers as a 32bit without using the... by ram sharma (5/12/2004)
 I wanted a help for converting a 2d drawing to 3d .... and wanted that in c code....
If... by rahul (11/9/2006)
 Actually in IPsec, in tunnel mode communication is done through gateway to gateway.When... by bliss (4/27/2004)
 I wish to develop ciphers using DES [ANSI X3.92] and ISO 10116 standards. Where do I find... by Kedar Agarkar (10/28/2003)
 I'm an undegraduate student and my final year project is to develop DES software..
I had... by Acab (12/9/2003)
 what do
these number say of mean
19 102 27 38 86 133 110 94 112 91
59 62 22 82 87 122... by steven shaginyan (10/23/2003)
 I heard that the the US recently went to court to try and stop use of an encryption system... by clayton (12/30/2003)
 how on earth would you encrypte an email so that your parents could not read it but your... by marshall Reid (11/4/2003)
 Hi everybody, I have a typical situation here. I am developing an encryption... by V.Girish (8/27/2003)
 how to prove a new block cipher, is resistant against differential cryptanalysis attack,... by nitihtz (6/16/2005)
 How the MIT is being used in the public key encryption by headache (10/24/2003)
 sometimes when i recieve a file it is like Rar and a bunch of weird shapes and writing or... by vers218 (9/15/2003)
Other questions awaiting answers:
