Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Search results for cryptography
1
votes
2
answers
1
ISRO 2024
Asymmetric encryption is not suitable for Confidentiality Authentication Key Exchange Prevention of Denail of Service
Asymmetric encryption is not suitable for ConfidentialityAuthenticationKey ExchangePrevention of Denail of Service
Ramayya
268
views
Ramayya
asked
Jan 7
Others
isro-2024
cryptography
non-gate
+
–
1
votes
1
answer
2
DRDO CSE 2022 Paper 2 | Question: 27
A transposition cipher (but not a rail-fence cipher) was used to produce the following ciphertext: $\text{X 2! H M E S S S E 2 Y T A 2 I I A}$ The key used was: $5 \; 2 \; 6 \; 3 \; 4 \; 1.$ What was the plaintext used (in English)?
A transposition cipher (but not a rail-fence cipher) was used to produce the following ciphertext:$\text{X 2! H M E S S S E 2 Y T A 2 I I A}$The key used was: $5 \; 2 \; ...
admin
425
views
admin
asked
Dec 15, 2022
Computer Networks
drdocse-2022-paper2
computer-networks
cryptography
7-marks
descriptive
+
–
1
votes
1
answer
3
DRDO CSE 2022 Paper 2 | Question: 25
Assume when encrypting $3$-bit plaintext with a block cipher with key $\text{K},$ ... with key $\mathrm{K}$ in counter mode (with initial counter value $=0):$ $\text{C}=100110000$ What was the plaintext?
Assume when encrypting $3$-bit plaintext with a block cipher with key $\text{K},$ the following ciphertext is obtained:$$\begin{array}{|c|c|}\hline \text{Plaintext} & \te...
admin
780
views
admin
asked
Dec 15, 2022
Computer Networks
drdocse-2022-paper2
computer-networks
cryptography
7-marks
descriptive
+
–
1
votes
0
answers
4
DRDO CSE 2022 Paper 2 | Question: 26
Suppose $\mathrm{A}$ and $\mathrm{B}$ use Diffie-Hellnian key exchange. Let the commonly agreed (i.e., global public) prime number $(q)=13$ and the primitive root $(\alpha)=6$. If $\text{A}$ chose the private value $\left(X_{A}\right)=5$ ... value $\left(X_{B}\right)=4$. Find the shared secret key $(\mathrm{K})$ between $\mathrm{A}$ and $\mathrm{B}$
Suppose $\mathrm{A}$ and $\mathrm{B}$ use Diffie-Hellnian key exchange. Let the commonly agreed (i.e., global public) prime number $(q)=13$ and the primitive root $(\alph...
admin
367
views
admin
asked
Dec 15, 2022
Computer Networks
drdocse-2022-paper2
computer-networks
cryptography
5-marks
descriptive
+
–
0
votes
2
answers
5
UGC NET CSE | July 2018 | Part 2 | Question: 45
Match the following symmetric block ciphers with corresponding block and key sizes: ... $\text{a-ii; b-iv; c-iii; d-i}$ $\text{a-iv; b-ii; c-iii; d-i}$
Match the following symmetric block ciphers with corresponding block and key sizes:$$\begin{array} {} & \textbf{List-I} & & \textbf{List-II} \\ \text{(a)} & \text{}\tex...
Pooja Khatri
1.5k
views
Pooja Khatri
asked
Jul 13, 2018
Computer Networks
ugcnetcse-july2018-paper2
cryptography
computer-networks
+
–
0
votes
0
answers
6
Introduction to Modern Cryptography
Let $\varepsilon>0$ be a constant. Say an encryption scheme is $\varepsilon$-perfectly secret if for every adversary $\mathcal{A}$ ... scheme that is $\varepsilon$-perfectly secret must have $|\mathcal{K}| \geq(1-2 \varepsilon) \cdot|\mathcal{M}| $
Let $\varepsilon>0$ be a constant. Say an encryption scheme is $\varepsilon$-perfectly secret if for every adversary $\mathcal{A}$ it holds that$$\operatorname{Pr}\left[\...
person
205
views
person
asked
Oct 16, 2021
Computer Networks
cryptography
+
–
2
votes
6
answers
7
UGC NET CSE | January 2017 | Part 2 | Question: 24
If $h$ is chosen from a universal collection of hash functions and is used to hash $n$ keys into a table of size $m$, where $n \leq m$, the expected number of collisions involving a particular key $x$ is less than __________. $1$ $1/n$ $1/m$ $n/m$
If $h$ is chosen from a universal collection of hash functions and is used to hash $n$ keys into a table of size $m$, where $n \leq m$, the expected number of collisions ...
go_editor
1.9k
views
go_editor
asked
Mar 24, 2020
DS
ugcnetjan2017ii
cryptography
hashing
data-structures
+
–
2
votes
4
answers
8
ISRO2018-78
Which one of the following algorithm is not used in asymmetric key cryptography? RSA Algorithm Gillie-Hellman Algorithm Electronic Code Book Algorithm None of the above
Which one of the following algorithm is not used in asymmetric key cryptography?RSA AlgorithmGillie-Hellman AlgorithmElectronic Code Book AlgorithmNone of the above
Arjun
14.2k
views
Arjun
asked
Apr 22, 2018
Computer Networks
isro2018
computer-networks
network-security
cryptography
+
–
0
votes
2
answers
9
UGC NET CSE | October 2020 | Part 2 | Question: 54
Which among the following statement(s) is(are) true? A hash function takes a message of arbitrary length and generates a fixed length code A hash function takes a message of fixed length and generates a code of variable length A hash function may give same hash value ... below: $(i)$ only $(ii)$ and $(iii)$ only $(i)$ and $(iii)$ only $(ii)$ only
Which among the following statement(s) is(are) true?A hash function takes a message of arbitrary length and generates a fixed length codeA hash function takes a message o...
go_editor
2.3k
views
go_editor
asked
Nov 20, 2020
Computer Networks
ugcnetcse-oct2020-paper2
computer-networks
network-security
cryptography
+
–
0
votes
1
answer
10
UGC NET CSE | October 2020 | Part 2 | Question: 32
Using ‘RSA’ public key cryptosystem, if $p=3$, $q=11$ and $d=7$, find the value of $e$ and encrypt the number $’19’$ $20, 19$ $33,11$ $3, 28$ $77, 28$
Using ‘RSA’ public key cryptosystem, if $p=3$, $q=11$ and $d=7$, find the value of $e$ and encrypt the number $’19’$$20, 19$$33,11$$3, 28$$77, 28$
go_editor
1.9k
views
go_editor
asked
Nov 20, 2020
Computer Networks
ugcnetcse-oct2020-paper2
computer-networks
network-security
cryptography
+
–
39
votes
3
answers
11
GATE CSE 2017 Set 1 | Question: 15
A sender $S$ sends a message $m$ to receiver $R$, which is digitally signed by $S$ with its private key. In this scenario, one or more of the following security violations can take place. $S$ ... with a fraudulent message Which of the following are possible security violations? I and II only I only II only II and III only
A sender $S$ sends a message $m$ to receiver $R$, which is digitally signed by $S$ with its private key. In this scenario, one or more of the following security violation...
Arjun
12.4k
views
Arjun
asked
Feb 14, 2017
Computer Networks
gatecse-2017-set1
computer-networks
cryptography
normal
network-security
out-of-gate-syllabus
+
–
2
votes
2
answers
12
MadeEasy Full Length Test 2019: Computer Networks - Rsa Security Networks
In an RSA system, the public key of given user is e = 31 and n = 3599. The private key of user will be ________
In an RSA system, the public key of given user is e = 31 and n = 3599. The private key of user will be ________
piya
12.0k
views
piya
asked
Jul 23, 2018
Computer Networks
computer-networks
rsa-security-networks
cryptography
made-easy-test-series
+
–
1
votes
2
answers
13
ISRO2020-44
In a columnar transportation cipher, the plain text is the tomato is a plant in the night shade family , keyword is $\text{TOMATO}$ . The cipher text is $\text{ TINESAX / EOAHTFX / HTLTHEY / MAIIAIX / TAPNGDL / OSTNHMX }$ ... $\text{ EOAHTFX / TINESAX / HTLTHEY / MAIIAIX / TAPNGDL / OSTNHMX }$
In a columnar transportation cipher, the plain text is “the tomato is a plant in the night shade family”, keyword is “$\text{TOMATO}$”. The cipher text is$\text{�...
Satbir
3.5k
views
Satbir
asked
Jan 13, 2020
Computer Networks
isro-2020
computer-networks
cryptography
normal
+
–
2
votes
2
answers
14
ISRO2020-45
Avalanche effect in cryptography refers Large changes in cipher text when the keyword is changed minimally Large changes in cipher text when the plain text is changed Large Impact of keyword change to length of the cipher text None of the above
Avalanche effect in cryptography refersLarge changes in cipher text when the keyword is changed minimallyLarge changes in cipher text when the plain text is changedLarge ...
Satbir
2.3k
views
Satbir
asked
Jan 13, 2020
Computer Networks
isro-2020
computer-networks
cryptography
normal
+
–
1
votes
1
answer
15
NTA NET DEC 2019 (DES)
The Data Encryption Standard (DES) has a function consists of four steps. Which of the following is correct order of these four steps? An expansion permutation, S boxes, an XOR operation, a straight permutation An expansion permutation, an XOR ... - boxes, an XOR operation, an expansion permutation A straight permutation, an XOR operation, S boxes, an expansion permutation
The Data Encryption Standard (DES) has a function consists of four steps. Which of the following is correct order of these four steps?An expansion permutation, S b...
Sanjay Sharma
2.5k
views
Sanjay Sharma
asked
Dec 29, 2019
Computer Networks
cryptography-des
+
–
0
votes
1
answer
16
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 22 (Page No. 873)
A math class has 25 students. Assuming that all of the students were born in the first half of the year—between January 1st and June 30th— what is the probability that at least two students have the same birthday? Assume that nobody was born on leap day, so there are 181 possible birthdays.
A math class has 25 students. Assuming that all of the students were born in the firsthalf of the year—between January 1st and June 30th— what is the probability that...
ajaysoni1924
653
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
network-security
cryptography
+
–
6
votes
3
answers
17
ISRO2017-35
$\text{MD5}$ is a widely used hash function for producing hash value of $64$ bits $128$ bits $512$ bits $1024$ bits
$\text{MD5}$ is a widely used hash function for producing hash value of$64$ bits$128$ bits$512$ bits$1024$ bits
sh!va
4.3k
views
sh!va
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
network-security
cryptography
+
–
0
votes
4
answers
18
UGC NET CSE | July 2018 | Part 2 | Question: 48
Decrypt the message "WTAAD" using the Caesar Cipher with key =15 LIPPS HELLO PLLEH DAATW
Decrypt the message "WTAAD" using the Caesar Cipher with key =15LIPPSHELLOPLLEHDAATW
Pooja Khatri
5.3k
views
Pooja Khatri
asked
Jul 13, 2018
Others
ugcnetcse-july2018-paper2
cryptography
encryption-decryption
+
–
0
votes
1
answer
19
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 32 (Page No. 874)
The Diffie-Hellman key exchange is being used to establish a secret key between Alice and Bob. Alice sends Bob (227, 5, 82). Bob responds with (125). Alice’s secret number, x, is 12, and Bob’s secret number, y, is 3. Show how Alice and Bob compute the secret key.
The Diffie-Hellman key exchange is being used to establish a secret key betweenAlice and Bob. Alice sends Bob (227, 5, 82). Bob responds with (125). Alice’ssecret numbe...
ajaysoni1924
1.7k
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
network-security
cryptography
+
–
27
votes
5
answers
20
GATE CSE 2016 Set 2 | Question: 23
Anarkali digitally signs a message and sends it to Salim. Verification of the signature by Salim requires. Anarkali's public key. Salim's public key. Salim's private key. Anarkali's private key.
Anarkali digitally signs a message and sends it to Salim. Verification of the signature by Salim requires.Anarkali's public key.Salim's public key.Salim's private key.Ana...
Akash Kanase
9.3k
views
Akash Kanase
asked
Feb 12, 2016
Computer Networks
gatecse-2016-set2
computer-networks
network-security
cryptography
easy
out-of-gate-syllabus
+
–
Page:
1
2
3
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register