As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance.
Closed 9 years ago.
Someone please state two or three applications of RSA algorithm. I heard that RSA is used for SSL. Is that true?
Yes, that is true. RSA is an encryption algorithm.
Example uses:
SSL
SSH
Digital signatures
PGP
RSA is used in cryptography in Key-based authentication.SSH uses this method of key generation as it is considered very secure.
see here for more
Related
As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance.
Closed 9 years ago.
i would like to ask about:
What is the difference between Authenticated Encryption Modes and Generic Composition Schemes in cryptography?
Thanks
Generic Composition Scheme basically tells you take some proven cipher and some proven MAC function, use the cipher for encryption and the MAC for integrity in some way and hope for the best.
Authenticated encryption modes are basically the same thing, just some cipher with a MAC function, but usually those where checked and have provable security. Such as GCM is a combination of CTR mode with GMAC, or CCM that uses CTR mode with CBC-MAC. Or using AES-CBC with HMAC.
As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance.
Closed 11 years ago.
If somebody writes a web server in a programming language, a server that listens on a socket (e.g. 80) and serves files with headers. What are the first threats it can experience once it goes out in the wild?
I would imagine that hackers will start with a buffer overflow attack. They could do things like call URLs that are too long or request headers that have malformed components.
As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance.
Closed 10 years ago.
i need some tutorial links that describes the creation of generic provisiong profile for development or distribution.
thanks for any help.
http://developer.apple.com/library/ios/#DOCUMENTATION/Xcode/Conceptual/iphone_development/128-Managing_Devices_and_Digital_Identities/devices_and_identities.html
http://www.dummies.com/how-to/content/how-to-create-an-apple-development-provisioning-pr.html
http://www.wikihow.com/Create-a-Provisioning-Profile-for-iPhone
http://www.musicalgeometry.com/?p=1237
http://iphonetesters.wordpress.com/2010/06/21/testing-iphone-applications-basic-steps/
http://www.jeroenvanwissen.nl/weblog/iphone/howto-iphone-application-development-environment
If you mean a provisioning profile that can be used across a suite of applications what you need to do is create a wildcard app id.
However, there are some limitations to using wildcards such as not being able to use gamecenter functionality.
See here for complete instructions
As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance.
Closed 10 years ago.
Is anyone aware of a plugable Email Templating solution for C#? I've grown weary of having to roll my own each project and I imagine there are more robust solutions out there. It should support HTML/non-HTML and allow for tokens (e.g. USERNAME is replaced with a configurable value).
ComponentForge Mail Merge Suite is a
set of flexible and easy-to-use .NET
components for generating dynamic
email content with DynamicTemplate.
http://www.componentforge.net/mailmergesuite.aspx
If you're looking for a free hack, OpenOffice claims to be capable of this:
http://internet.cybermesa.com/~aaron_w/OOo_email_merge/OOo_email_merge.html
As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance.
Closed 10 years ago.
Does anyone know for any good resource on the web or book where the explanation for Viterbi decoder or a tutorial on how to decode a received bit sequence by using trellis diagram could be found?
Thanks!
A good explanation can be found on 1-core.
Wikipedia, of course, has plenty of background information.
There is actually a website which will generate viterbi decoder software for you. How cool is that?
Digital Communications: Fundamentals and Applications - Bernard Sklar perhaps.