Same Question as this one:

The Gateway to Computer Science Excellence

+19 votes

Suppose that everyone in a group on $N$ people wants to communicate secretly with

the $(\text{N - 1})$ others using symmetric Key cryptographic system.

The communication between any two person should not be decodable by the others

in the group. The numbers of keys required in the system as a whole to satisfy

the confidentiality requirement is

- $2N$
- $N(N-1)$
- $\dfrac{N(N-1)}{2}$
- $(N-1)^{2}$

+35 votes

Best answer

In symmetric key cryptographic system, both parties have access to key.

So, the first person has $\text{N-1 keys}$ with other $\text{N-1}$ people,

second one has another $\text{N-2}$ with $\text{N-2}$ people ( $1$ we already

considered ) and so on till $1.$

So, Total number of keys required $= N-1 + N-2 +\ldots + 1$

$=\dfrac{N(N-1)}{2}$

**C choice.**

Had we been using Public key cryptography we needed just $2N$ keys in the system.

Reference: https://en.wikipedia.org/wiki/Symmetric-key_algorithm

+3

I don't understand this. My point would be like this:

As they have asked the number of keys as a whole and not summed up on individual knowledge of no of keys for each person, hence what I could think of is:

As per symmetric cryptography we can communicate with a person secretly if we have his public key, and in turn that person will use his own private key to decrypt the message and no one else.

So each person posses a **Public Key **& a **Private Key** each, and so for N persons with 2 keys each.

the total number of keys in the system would be 2*N = 2N to suffice a confidential communication.

To think of the whole system I would think like: I have a huge whiteboard on which N public keys are written and each N person possesses his own private key which is secret.

Please correct me if I am wrong somewhere.

+4

You are correct but that is for Public Key cryptography.

https://en.wikipedia.org/wiki/Symmetric-key_algorithm

https://en.wikipedia.org/wiki/Symmetric-key_algorithm

0

@Arjun Since both parties participating in a communication share one secret key, I assume that each party is in possession of a copy of the key

.

Also, the inclusion of the phrase "as a whole" in the problem, and $N(N-1)$ as one of the option do require your comments on why the number of the secret keys used per communication not be counted as $2$?

+10 votes

IT is complete Graph of N vertex

where each edge B/W two Vertex need Distinct Key

Total number of Edges in Complete Graph is NC_{2 }= N(N-1)/2

+4 votes

**Answer is therefore C**

- All categories
- General Aptitude 1.9k
- Engineering Mathematics 7.5k
- Digital Logic 2.9k
- Programming and DS 4.9k
- Algorithms 4.4k
- Theory of Computation 6.2k
- Compiler Design 2.1k
- Databases 4.1k
- CO and Architecture 3.4k
- Computer Networks 4.2k
- Non GATE 1.4k
- Others 1.4k
- Admissions 595
- Exam Queries 573
- Tier 1 Placement Questions 23
- Job Queries 72
- Projects 18

50,737 questions

57,302 answers

198,306 comments

105,008 users