Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged rsa-security-networks
0
votes
4
answers
1
UGC NET CSE | January 2017 | Part 3 | Question: 29
In RSA public key cryptosystem suppose $n=p*q$ where $p$ and $q$ are primes. $(e,n)$ and $(d,n)$ are public and private keys respectively. Let $M$ be an integer such that $o< M< n$ and $\phi(n)=(p-1)(q-1)$. Which of the following equations ... I and II I and III II and III I and IV
In RSA public key cryptosystem suppose $n=p*q$ where $p$ and $q$ are primes. $(e,n)$ and $(d,n)$ are public and private keys respectively. Let $M$ be an integer such that...
go_editor
1.1k
views
go_editor
asked
Mar 24, 2020
Computer Networks
ugcnetcse-jan2017-paper3
computer-networks
rsa-security-networks
+
–
1
votes
1
answer
2
UGC NET CSE | June 2019 | Part 2 | Question: 90
The RSA encryption algorithm also works in reverse, that is, you can encrypt a message with the private key and decrypt it using the public key. This property is used in instruction detection systems digital signatures data compression certification
The RSA encryption algorithm also works in reverse, that is, you can encrypt a message with the private key and decrypt it using the public key. This property is used ini...
Arjun
2.4k
views
Arjun
asked
Jul 2, 2019
Computer Networks
ugcnetcse-june2019-paper2
network-security
rsa-security-networks
computer-networks
+
–
0
votes
1
answer
3
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 18 (Page No. 873)
Alice and Bob use RSA public key encryption in order to communicate between them. Trudy finds out that Alice and Bob shared one of the primes used to determine the number n of their public key pairs. In other words, Trudy found out that na = pa × q and nb = pb × q. How can Trudy use this information to break Alice’s code?
Alice and Bob use RSA public key encryption in order to communicate between them.Trudy finds out that Alice and Bob shared one of the primes used to determine thenumber n...
ajaysoni1924
1.1k
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
network-security
rsa-security-networks
tanenbaum
+
–
1
votes
2
answers
4
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 17 (Page No. 873)
Using the RSA public key cryptosystem, with a = 1, b = 2 . . . y = 25, z = 26. (a) If p = 5 and q = 13, list five legal values for d. (b) If p = 5, q = 31, and d = 37, find e. (c) Using p = 3, q = 11, and d = 9, find e and encrypt ‘‘hello’’.
Using the RSA public key cryptosystem, with a = 1, b = 2 . . . y = 25, z = 26.(a) If p = 5 and q = 13, list five legal values for d.(b) If p = 5, q = 31, and d = 37, find...
ajaysoni1924
2.3k
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
network-security
rsa-security-networks
+
–
0
votes
0
answers
5
gfg quiz
From a large set of prime numbers Jimmy choose 23 and 17 as P and Q respectively and a random integer to be 13. Jimmy wants to sends a plain text to M = 127. What will be the value of cipher text using RSA? since i am getting ciphertext =(127^13) mod 391 now how should i calculate
From a large set of prime numbers Jimmy choose 23 and 17 as P and Q respectively and a random integer to be 13. Jimmy wants to sends a plain text to M = 127. What will be...
vijju532
521
views
vijju532
asked
Dec 17, 2018
Computer Networks
computer-networks
network-security
rsa-security-networks
+
–
1
votes
1
answer
6
Ace Test Series: Computer Networks - RSA Algorithm
Shankar Kakde
500
views
Shankar Kakde
asked
Nov 1, 2018
Computer Networks
computer
network-security
rsa-security-networks
ace-test-series
+
–
2
votes
2
answers
7
MadeEasy Full Length Test 2019: Computer Networks - Rsa Security Networks
In an RSA system, the public key of given user is e = 31 and n = 3599. The private key of user will be ________
In an RSA system, the public key of given user is e = 31 and n = 3599. The private key of user will be ________
piya
12.3k
views
piya
asked
Jul 23, 2018
Computer Networks
computer-networks
rsa-security-networks
cryptography
made-easy-test-series
+
–
2
votes
3
answers
8
self doubt RSA Algorithm
How To Solve..? 17 * d = 1 mod 3120. should we need to apply bruteforce?
How To Solve..? 17 * d = 1 mod 3120.should we need to apply bruteforce?
hacker16
2.9k
views
hacker16
asked
Jan 29, 2018
Computer Networks
rsa-security-networks
+
–
2
votes
0
answers
9
Cryptography - RSA Algorithm
In RSA Algorithm, we have public key(e,n) and private key(d,n). Sender side we encrypt plain text P as an integer between 0 and n-1 as follows: $P^{e}modn$ ... message P we are taking it as as integer between 0 and n-1. So, the P may not be coprime to n. Then how does the algorithm work?
In RSA Algorithm, we have public key(e,n) and private key(d,n).Sender side we encrypt plain text P as an integer between 0 and n-1 as follows:$P^{e}modn$and send it.At re...
Ashish Sharma 3
1.1k
views
Ashish Sharma 3
asked
Jan 12, 2018
Computer Networks
network-security
computer-networks
rsa-security-networks
cryptography
+
–
1
votes
0
answers
10
MadeEasy Test Series: Computer Networks - Network Security
Please explain
Please explain
charul
426
views
charul
asked
Jan 7, 2018
Computer Networks
made-easy-test-series
computer-networks
network-security
rsa-security-networks
+
–
2
votes
2
answers
11
RSA Public key Cryptosystem
Plz tell me how to solve this .I am feeling problem o calculate -- 10 = p^5 mod 35 . How to solve this type of question quickly.
Plz tell me how to solve this .I am feeling problem o calculate 10 = p^5 mod 35 . How to solve this type of question quickly.
dragonball
2.0k
views
dragonball
asked
Jan 4, 2018
Computer Networks
computer-networks
network-security
rsa-security-networks
+
–
0
votes
1
answer
12
MadeEasy Test Series: Computer Networks - Network Security
s1 only s1 and s2 s2,s3,s4 none of these
s1 onlys1 and s2s2,s3,s4none of these
Shivi rao
411
views
Shivi rao
asked
Dec 12, 2017
Computer Networks
made-easy-test-series
computer-networks
network-security
rsa-security-networks
+
–
0
votes
2
answers
13
RSA cryptosystem
Alice chooses 5 and 11 as P and Q respectively and e is a random number 13. Public key for Alice 35. Private key for Bob 17. What is the value of Cipher text for Alice,Plain text for Bob, Private key for Alice, Public key for Bob? ------------------------------ ... --------------------------------- Now I got confuse with formula and logic Can someone tell me which logic used where?
Alice chooses 5 and 11 as P and Q respectively and e is a random number 13. Public key for Alice 35. Private key for Bob 17. What is the value of Cipher text for Alice,Pl...
srestha
3.4k
views
srestha
asked
Dec 10, 2017
Computer Networks
computer-networks
rsa-security-networks
+
–
0
votes
1
answer
14
MadeEasy Test Series: Computer Networks - Network Security
Consider the following statements with respect to digital signatures: S1: Digital signature ensures authenticity of the sender but not integrity of the message. S2: A single secret key can be used by the sender to sign multiple ... Both RSA cryptosystem and RSA digital signature scheme uses same set of keys. Which of the following is true?
Consider the following statements with respect to digital signatures:S1: Digital signature ensures authenticity of the sender but not integrity of the message.S2: A singl...
Appu B
1.8k
views
Appu B
asked
Dec 3, 2017
Computer Networks
made-easy-test-series
computer-networks
cryptography
network-security
rsa-security-networks
+
–
0
votes
1
answer
15
Computer network network security
Please explain theorem in simplest way and solve example with explanation. Using RSA algorithm what is the value of cipher test c if the plain text m=5 and P=3, q=11 & d = 7 ( if d not given how to find d ).
Please explain theorem in simplest way and solve example with explanation.Using RSA algorithm what is the value of cipher test c if the plain text m=5 and P=3, q=11 & d =...
Harikesh Kumar
795
views
Harikesh Kumar
asked
Dec 2, 2017
Computer Networks
network-security
computer-networks
rsa-security-networks
+
–
1
votes
0
answers
16
CN Network Security
Message digest provides only message authentication or can it provide user authentication also? MDC is a digest for message authentication.Can i also say MAC is also a digest for sender authentication?Please explain this
Message digest provides only message authentication or can it provide user authentication also?MDC is a digest for message authentication.Can i also say MAC is also a dig...
rahul sharma 5
300
views
rahul sharma 5
asked
Aug 13, 2017
Computer Networks
computer-networks
computer
rsa-security-networks
+
–
39
votes
12
answers
17
GATE CSE 2017 Set 1 | Question: 44
In a RSA cryptosystem, a participant $A$ uses two prime numbers $p = 13$ and $q = 17$ to generate her public and private keys. If the public key of $A$ is $35$, then the private key of $A$ is __________ .
In a RSA cryptosystem, a participant $A$ uses two prime numbers $p = 13$ and $q = 17$ to generate her public and private keys. If the public key of $A$ is $35$, then the ...
Arjun
23.9k
views
Arjun
asked
Feb 14, 2017
Computer Networks
gatecse-2017-set1
network-security
computer-networks
rsa-security-networks
out-of-gate-syllabus
numerical-answers
normal
+
–
1
votes
1
answer
18
RSA algorithm
How to find value of d in RSA algorithm given the values of p , n and e ? Example: p=11 q=7 hence n =77 z = 10 × 6 = 60 e =13 (given) Now d should be multiplicative inverse of e mod z.. How to find it ?
How to find value of d in RSA algorithm given the values of p , n and e ?Example:p=11q=7hence n =77z = 10 × 6 = 60e =13 (given)Now d should be multiplicative inverse of ...
Nitesh Methani
1.2k
views
Nitesh Methani
asked
Jan 11, 2017
Computer Networks
rsa-security-networks
+
–
To see more, click for the
full list of questions
or
popular tags
.
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register