Tuesday, 30 July 2024

Why there is a need of decentralized digital currency ?


Why there is a need of decentralized digital currency ?

Why there is a need of decentralized digital currency?In a decentralized market, how can individual prove their transaction ...

Read More
data structures and algorithms
data structures and algorithms Web Developer

What is Cryptographic Hash Function? Why do we require cryptographic hash function?


What is Cryptographic Hash Function? Why do we require cryptographic hash function?

 What is Cryptographic Hash Function? Why do we require cryptographic hash functio ...

Read More
data structures and algorithms
data structures and algorithms Web Developer

Explain elliptic curve cryptography algorithm in detail with example step by step ?


Explain elliptic curve cryptography algorithm in detail with example step by step ?

Elliptic Curve Cryptography Algorithm : in detail with example step by step explanation is as follows.Algorithm:Step 1: Start.Step 2: Encode a plain text message as a point on the curve.Step 3: Compute/Establish ...

Read More
data structures and algorithms
data structures and algorithms Web Developer

Monday, 29 July 2024

What is Elliptic Curve Cryptography? Part 1 Basics Knowledge required about Elliptic Curve in detail with 10 Questions


What is Elliptic Curve Cryptography? Part 1 Basics Knowledge required about Elliptic Curve in detail with 10 Questions

What is Elliptic Curve Cryptography? Part 1: Basics Knowledge required about Elliptic Curve in detail with 10 questions.Before studying the Elliptic Curve Cryptography We must have knowledge ...

Read More
data structures and algorithms
data structures and algorithms Web Developer

Sunday, 28 July 2024

What is Asymmetric Key Cryptography and also explain the detailed working of Asymmetric Key Cryptography?


What is Asymmetric Key Cryptography and also explain the detailed working of Asymmetric Key Cryptography?

 What is Asymmetric Key Cryptography and also explain the detailed working of Asymmetric Key Cryptography?After reading the above notes you are able to answer the following questions?1. What is ...

Read More
data structures and algorithms
data structures and algorithms Web Developer

UGC NET question on Symmetric Key Cryptography: consider if four devices are connected with each other then how many keys are needed ?


UGC NET question on Symmetric Key Cryptography: consider if four devices are connected with each other then how many keys are needed ?

UGC NET Question on Symmetric Key Cryptography: Consider if four devices are connected with each other then how many symmetric keys are needed ?Example:Take your own example and try to solve it by referring ...

Read More
data structures and algorithms
data structures and algorithms Web Developer

What is Symmetric Key Cryptography? What are the Challenges in symmetric key cryptography?


What is Symmetric Key Cryptography? What are the Challenges in symmetric key cryptography?

 Symmetric Key Cryptography:After reading the above contents you are able to answer following questions.1. What is mean by unsecure channel?2. What is Symmetric Key? (Symmetric Key means same ...

Read More
data structures and algorithms
data structures and algorithms Web Developer