The Gateway to Computer Science Excellence
For all GATE CSE Questions
Toggle navigation
Facebook Login
or
Email or Username
Password
Remember
Login
Register
|
I forgot my password
Activity
Questions
Unanswered
Tags
Subjects
Users
Ask
Prev
Blogs
New Blog
Exams
Recent questions tagged cryptography
0
votes
0
answers
1
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 22 (Page No. 873)
A math class has 25 students. Assuming that all of the students were born in the first half of the year—between January 1st and June 30th— what is the probability that at least two students have the same birthday? Assume that nobody was born on leap day, so there are 181 possible birthdays.
asked
Mar 19
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
52
views
computer-networks
network-security
cryptography
0
votes
0
answers
2
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 33 (Page No. 874)
33. Two users can establish a shared secret key using the Diffie-Hellman algorithm, even if they have never met, share no secrets, and have no certificates (a) Explain how this algorithm is susceptible to a man-in-the-middle attack. (b) How would this susceptibility change if n or g were secret?
asked
Mar 19
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
39
views
computer-networks
network-security
cryptography
descriptive
0
votes
1
answer
3
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 32 (Page No. 874)
The Diffie-Hellman key exchange is being used to establish a secret key between Alice and Bob. Alice sends Bob (227, 5, 82). Bob responds with (125). Alice’s secret number, x, is 12, and Bob’s secret number, y, is 3. Show how Alice and Bob compute the secret key.
asked
Mar 19
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
55
views
computer-networks
network-security
cryptography
0
votes
0
answers
4
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 25 (Page No. 873)
Alice wants to communicate with Bob, using public-key cryptography. She establishes a connection to someone she hopes is Bob. She asks him for his public key and he sends it to her in plaintext along with an X.509 certificate signed ... that Bob does not care who he is talking to (e.g., Bob is some kind of public service).
asked
Mar 19
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
35
views
computer-networks
network-security
tanenbaum
cryptography
0
votes
1
answer
5
crypt arithmetic
If 356 + 123 = 512 .Then what is the value of 653 + 321? 1.215 2.974 3.1004 4.1304 How to solve these type questions?
asked
Jan 27
in
Numerical Ability
by
screddy1313
(
481
points)
|
190
views
numerical
cryptography
0
votes
1
answer
6
DH algorithm
How to calculate such a value: Please, someone explain because this is not possible on cal….!
asked
Jan 26
in
Computer Networks
by
Nandkishor3939
Active
(
1.3k
points)
|
78
views
computer-networks
cryptography
0
votes
1
answer
7
Calculate mod in RSA algorithm
How to calculate Mod of a big number in RSA Like 5 raise to power 13 mod 77
asked
Dec 10, 2018
in
Computer Networks
by
Fida
(
63
points)
|
238
views
cryptography
computer-networks
0
votes
0
answers
8
Short cut to calculate d (private key) ins RSA algorithm
Please tell me shortcut to calculate d (private key) in RSA Algorithm
asked
Nov 13, 2018
in
Computer Networks
by
Fida
(
63
points)
|
260
views
-rsa
algorithms
-
cryptography
0
votes
1
answer
9
Cryptography
Using RSA key crypto system with a = 1, b = 2 etc; value for encryption if prime value are p = 7 and q = 11, the legal value for secret key is . a)69 b)49 c)49 d)119
asked
Oct 12, 2018
in
Computer Networks
by
Shivangi Parashar 2
(
303
points)
|
206
views
cryptography
network-security
computer-networks
+1
vote
1
answer
10
Diffie Hellman
asked
Sep 15, 2018
in
Computer Networks
by
Na462
Loyal
(
6.9k
points)
|
154
views
computer-networks
cryptography
0
votes
0
answers
11
Cryptography Topics in Syllabus
Are the following topics there in Syllabus? Digital Signatures Elgamal Digital Signature Scheme Schnorr Digital Signature Scheme Message Authentication Codes Data Encryption Standard (DES) Advanced Encryption Standard (AES) Triple DES Elliptic Curve Cryptography Secure Hash Algorithm (SHA) Message Authentication Codes(MAC)
asked
Aug 5, 2018
in
Computer Networks
by
Balaji Jegan
Active
(
4.9k
points)
|
106
views
cryptography
+2
votes
2
answers
12
MadeEasy Full Length Test 2019: Computer Networks - Rsa Security Networks
In an RSA system, the public key of given user is e = 31 and n = 3599. The private key of user will be ________
asked
Jul 23, 2018
in
Computer Networks
by
piya
(
191
points)
|
1.1k
views
computer-networks
rsa-security-networks
cryptography
madeeasy-testseries-2019
made-easy-test-series
0
votes
1
answer
13
UGCNET-July-2018-II-45
Match the following symmetric block ciphers with corresponding block and key sizes: List - I List -II a DES i block size 64 and key size ranges between 32 and 448 b IDEA ii block size 64 and key size 64 c BLOW FISH iii block size 128 and key sizes 128, 192, 256 d AES iv block size 64 and key ... -i; d-iii a-ii; b-iv; c-i; d-iii a-ii; b-iv; c-iii; d-i a-iv; b-ii; c-iii; d-i
asked
Jul 13, 2018
in
Others
by
Pooja Khatri
Boss
(
10.8k
points)
|
420
views
ugcnetjuly2018ii
cryptography
0
votes
4
answers
14
UGCNET-July-2018-II-48
Decrypt the message "WTAAD" using the Caesar Cipher with key =15 LIPPS HELLO PLLEH DAATW
asked
Jul 13, 2018
in
Others
by
Pooja Khatri
Boss
(
10.8k
points)
|
1.2k
views
ugcnetjuly2018ii
cryptography
encryption
0
votes
2
answers
15
UGCNET-July-2018-II-50
Encrypt the Message "HELLO MY DEARZ" using Transposition Cipher with $Key \begin{cases} \text{Plain Text} & 2 4 3 1 \\ \text{Cipher Text} &1 2 3 4 \end{cases}$ HLLEO YM AEDRZ EHOLL ZYM RAED ELHL MDOY AZER ELHL DOMY ZAER
asked
Jul 13, 2018
in
Others
by
Pooja Khatri
Boss
(
10.8k
points)
|
1.4k
views
ugcnetjuly2018ii
cryptography
encryption
0
votes
0
answers
16
group theory and cryptography
How is group theory and cryptography linked?
asked
May 2, 2018
in
Others
by
Sri
(
55
points)
|
61
views
groups
cryptography
+2
votes
0
answers
17
Cryptography - RSA Algorithm
In RSA Algorithm, we have public key(e,n) and private key(d,n). Sender side we encrypt plain text P as an integer between 0 and n-1 as follows: $P^{e}modn$ ... message P we are taking it as as integer between 0 and n-1. So, the P may not be coprime to n. Then how does the algorithm work?
asked
Jan 12, 2018
in
Computer Networks
by
Ashish Sharma 3
(
343
points)
|
490
views
network-security
computer-networks
rsa-security-networks
cryptography
0
votes
1
answer
18
MadeEasy Test Series: Computer Networks - Network Security
Consider the following statements with respect to digital signatures: S1: Digital signature ensures authenticity of the sender but not integrity of the message. S2: A single secret key can be used by the sender to sign multiple ... Both RSA cryptosystem and RSA digital signature scheme uses same set of keys. Which of the following is true?
asked
Dec 3, 2017
in
Computer Networks
by
Appu B
(
259
points)
|
183
views
made-easy-test-series
computer-networks
cryptography
network-security
rsa-security-networks
0
votes
1
answer
19
Doubt!
You generate a perfectly random key K. You send two messages, M1 and M2, encrypted with K (C1 = K xor M1 and C2 = K xor M2). Does sending C2 leak information about M1 and M2?
asked
Dec 2, 2017
in
Computer Networks
by
vijay_jr
Active
(
1.1k
points)
|
80
views
cryptography
network-security
+2
votes
1
answer
20
Networking
Using RSA, choose p = 3 and q = 11, and encrypt “DOG” as one message m.
asked
Jul 4, 2017
in
Computer Networks
by
reena_kandari
Loyal
(
8.1k
points)
|
150
views
cryptography
+29
votes
3
answers
21
GATE2017-1-15
A sender $S$ sends a message $m$ to receiver $R$, which is digitally signed by $S$ with its private key. In this scenario, one or more of the following security violations can take place. $S$ can launch a birthday attack to replace $m$ with a ... $m$ with a fraudulent message Which of the following are possible security violations? I and II only I only II only II and III only
asked
Feb 14, 2017
in
Computer Networks
by
Arjun
Veteran
(
425k
points)
|
4.8k
views
gate2017-1
computer-networks
cryptography
normal
0
votes
1
answer
22
MadeEasy Subject Test: Computer Networks - Cryptography
asked
Feb 7, 2017
in
Computer Networks
by
pkb
Junior
(
599
points)
|
104
views
made-easy-test-series
computer-networks
cryptography
+1
vote
1
answer
23
MadeEasy Subject Test: Computer Networks - Cryptography
asked
Jan 12, 2017
in
Computer Networks
by
Akanksha Kesarwani
Junior
(
995
points)
|
93
views
computer-networks
made-easy-test-series
cryptography
0
votes
1
answer
24
Ace Test Series: Computer Networks - Cryptography
asked
Jan 1, 2017
in
Computer Networks
by
chaser
(
321
points)
|
84
views
ace-test-series
computer-networks
cryptography
+3
votes
2
answers
25
UGCNET-AUG2016-III-30
The plain text message $BAHI$ encrypted with $RSA$ algorithm using $e = 3, d = 7$ and $n = 33$ and the characters of the message are encoded using the values $00$ to $25$ for letters A to Z. Suppose character by character encryption was implemented. Then, the Cipher Text message is _____. ABHI HAQC IHBA BHQC
asked
Oct 1, 2016
in
Computer Networks
by
makhdoom ghaya
Boss
(
30.2k
points)
|
1.8k
views
ugcnetaug2016iii
cryptography
computer-networks
0
votes
1
answer
26
Cryptography
what is the difference between public key and private key ?
asked
Sep 1, 2016
in
Computer Networks
by
Karthik Akula
(
447
points)
|
332
views
computer-networks
cryptography
+3
votes
1
answer
27
UGCNET-Dec2013-III-32
Find the false statement: In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. The symmetric cipher DES (Data Encryption Standard) was widely used in the industry for security product. The AES (Advanced ... key lengths of size 56 bits and 124 bits. Public key algorithms use two different keys for Encryption and Decryption
asked
Jul 28, 2016
in
Computer Networks
by
jothee
Veteran
(
105k
points)
|
607
views
ugcnetdec2013iii
computer-networks
cryptography
+1
vote
1
answer
28
UGCNET-Sep2013-III-57
If user A wants to send an encrypted message to user B, the plain text of A is encrypted with the Public key of user A Public key of user B Private key of user A Private key of user B
asked
Jul 24, 2016
in
Others
by
jothee
Veteran
(
105k
points)
|
673
views
ugcnetsep2013iii
cryptography
encryption
+1
vote
2
answers
29
UGCNET-Sep2013-III-3
Assume that each alphabet can have a value between 0 to 9 in a cryptoarithmetic problem Which of the following statements is true? No two alphabets can have the same numeric value Any two alphabets can have the same numeric value D=0 D=1 I and III I and IV II and III II and IV
asked
Jul 22, 2016
in
Others
by
jothee
Veteran
(
105k
points)
|
592
views
ugcnetsep2013iii
cryptography
crypt-arithmetic
+2
votes
3
answers
30
UGCNET-Dec2014-II-30
How many distinct stages are there in $DES$ algorithm, which is parameterized by a $56$-bit key ? $16$ $17$ $18$ $19$
asked
Jul 21, 2016
in
Computer Networks
by
makhdoom ghaya
Boss
(
30.2k
points)
|
2k
views
ugcnetdec2014ii
computer-networks
cryptography
Page:
1
2
next »
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
-tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
Linear Algebra Important Points
GATE 2020
OFFICIAL GATE MOCK TEST RELEASED
IIITH: Winter Research Admissions 2019 (For Spring 2020)
TIFR and JEST exam
Follow @csegate
Recent questions tagged cryptography
Recent Blog Comments
Even In 2019 my 16 questions goes for negative...
i also don't have any pdf, actually, I added the...
i don't have , if you have upload it
@mohan123 Do you have all standard book...
bro can be upload all standard book questions in...
50,647
questions
56,497
answers
195,489
comments
100,811
users