
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Satish Kumar has Published 1032 Articles

Satish Kumar
10K+ Views
What is a Birthday Attack? A birthday attack is a type of cryptographic attack that relies on the birthday paradox to find a collision in a hash function. A hash function is a mathematical function that takes an input (called a message) and produces a fixed-size output (called a hash ... Read More

Satish Kumar
3K+ Views
What is a Public Key Signature? A public key signature is a type of digital signature that uses a pair of keys – a public key and a private key – to authenticate the sender of a message. The private key is kept secret by the sender and is used ... Read More

Satish Kumar
3K+ Views
What is a Symmetric Key? A symmetric key is a type of cryptography in which the same secret key is used for both encrypting and decrypting a message. It is also referred to as a shared secret because both the sender and the recipient of the message must have the ... Read More

Satish Kumar
19K+ Views
What is Symmetric Key Algorithms? Symmetric key algorithms are a type of cryptographic technique that uses a shared secret key for both encryption and decryption. This means that the same key is used to encode and decode the message. Symmetric key algorithms are generally faster and more efficient than asymmetric ... Read More

Satish Kumar
14K+ Views
What is Cryptographic? Cryptography is the study of techniques for secure communication in the presence of third parties. It involves the use of mathematical algorithms and protocols to secure the confidentiality, integrity, and authenticity of communication. Cryptography is used in a wide range of applications, including securing communication over the ... Read More

Satish Kumar
1K+ Views
What is Quantum Cryptography? Quantum cryptography is a field of study that focuses on the use of quantum mechanical phenomena, such as superposition and entanglement, to secure communication. Quantum cryptography involves the use of quantum states to encode and transmit information, and it is based on the principles of quantum ... Read More

Satish Kumar
6K+ Views
Kerckhoff's principle, also known as Kerckhoff's law, is a principle in cryptography that states that a cryptographic system should be secure even if everything about the system, except for the key, is public knowledge. This principle is also sometimes referred to as "security through obscurity is not security." The principle ... Read More

Satish Kumar
9K+ Views
What Is a Distributed Hash Table? A distributed hash table (DHT) is a type of distributed system that provides a lookup service similar to a hash table. In a hash table, data is stored and retrieved using keys, and the keys are used to determine the location of the data ... Read More

Satish Kumar
10K+ Views
A peer-to-peer (P2P) network is a type of network in which each participant (or "peer") can act as both a client and a server, allowing them to share resources and information directly with one another without the need for a central server. P2P networks are decentralized, meaning that there is ... Read More

Satish Kumar
1K+ Views
H.323 Protocol Explained H.323 is a set of standards for real-time communication over IP networks, such as the internet. It was developed by the International Telecommunication Union (ITU) in the late 1990s as a way to enable voice, video, and data communication over IP networks. H.323 is a suite of ... Read More