menu
Login
Register
search
Log In
account_circle
Log In
Email or Username
Password
Remember
Log In
Register
I forgot my password
Register
Username
Email
Password
Register
add
Activity
Questions
Unanswered
Tags
Subjects
Users
Ask
Prev
Blogs
New Blog
Exams
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
-tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
Barc Interview Experience 2020- CSE stream
JEST 2021 registrations are open
TIFR GS-2021 Online Application portal
IIT Jodhpur Mtech AI - Interview Expierence (Summer Admission)
Interview experience at IIT Tirupati for MS program winter admission
Subjects
All categories
General Aptitude
(2.1k)
Engineering Mathematics
(8.5k)
Digital Logic
(3k)
Programming and DS
(5.1k)
Algorithms
(4.5k)
Theory of Computation
(6.3k)
Compiler Design
(2.2k)
Operating System
(4.7k)
Databases
(4.3k)
CO and Architecture
(3.5k)
Computer Networks
(4.3k)
Non GATE
(1.2k)
Others
(1.3k)
Admissions
(595)
Exam Queries
(838)
Tier 1 Placement Questions
(16)
Job Queries
(71)
Projects
(19)
Unknown Category
(1.1k)
Recent Blog Comments
hi this pdf have gate prevoius year questions or...
Thanks, dude for sharing your experience !! It...
Congratulations, at least you made it to the...
seems like you really enjoyed the process.......
I wrote an email to IISC regarding JEST 2021 but...
Network Sites
GO Mechanical
GO Electrical
GO Electronics
GO Civil
CSE Doubts
made easy test series (network security)
0
votes
127
views
asked
Dec 24, 2018
in
Computer Networks
Ashishwastaken
127
views
answer
comment
0
$3599=59*61$
$\phi(n)=(59-1)*(61-1)=3480$
$d*e\equiv (1)mod(3480)$
After solving a lot
$d = 3031$
0
i got d=449. after that how did we get 3031 i need to understand that?
0
(449*31)3480 is not 1
0
its d= -449 so it will be 3480-449= 3031
0
multiplicative inverse
Please
log in
or
register
to add a comment.
Please
log in
or
register
to answer this question.
0
Answers
← Prev.
Next →
← Prev. Qn. in Sub.
Next Qn. in Sub. →
Related questions
1
vote
4
answers
1
252
views
MadeEasy Test Series: Computer Networks - Network Security
DH key exchange algorithm is used to establish a session between sender and receiver with n=23 and g=5. The sender's secret key is 6 and the receiver's secret key is 15. What is the secret key between the receiver and sender? Please explain with solution P.S: Answer is given as 2
DH key exchange algorithm is used to establish a session between sender and receiver with n=23 and g=5. The sender's secret key is 6 and the receiver's secret key is 15. What is the secret key between the receiver and sender? Please explain with solution P.S: Answer is given as 2
asked
Aug 18, 2018
in
Computer Networks
Kalpataru Bose
252
views
made-easy-test-series
network-security
computer-networks
0
votes
2
answers
2
328
views
MadeEasy Test Series 2018: Computer Networks - Network Security
Consider the following services in network security: 1. Authentication of message 2. Integrity 3. Privacy 4. Non repudiation Which of the security services is/are not provided by digital signature?
Consider the following services in network security: 1. Authentication of message 2. Integrity 3. Privacy 4. Non repudiation Which of the security services is/are not provided by digital signature?
asked
Apr 30, 2018
in
Computer Networks
Kartavya Kothari
328
views
made-easy-test-series
computer-networks
network-security
0
votes
0
answers
3
200
views
Ace Test Series: Computer Networks - Network Security
If p is any prime number such that a p-1 =r (mod p) and p=3 , a=6 then value of r is ________________
If p is any prime number such that a p-1 =r (mod p) and p=3 , a=6 then value of r is ________________
asked
Jan 30, 2018
in
Computer Networks
Agam
200
views
computer-networks
network-security
ace-test-series
1
vote
0
answers
4
164
views
MadeEasy Test Series: Computer Networks - Network Security
Please explain
Please explain
asked
Jan 7, 2018
in
Computer Networks
charul
164
views
made-easy-test-series
computer-networks
network-security
rsa-security-networks
...