Login
Register
@
Dark Mode
Profile
Edit my Profile
Messages
My favorites
Register
Activity
Q&A
Questions
Unanswered
Tags
Subjects
Users
Ask
Previous Years
Blogs
New Blog
Exams
Dark Mode
Recent questions tagged cryptography
1
vote
2
answers
1
ISRO 2024
Asymmetric encryption is not suitable for Confidentiality Authentication Key Exchange Prevention of Denail of Service
Ramayya
asked
in
Others
Jan 7
by
Ramayya
256
views
isro-2024
cryptography
non-gate
1
vote
1
answer
2
DRDO CSE 2022 Paper 2 | Question: 25
Assume when encrypting $3$-bit plaintext with a block cipher with key $\text{K},$ ... with key $\mathrm{K}$ in counter mode (with initial counter value $=0):$ $\text{C}=100110000$ What was the plaintext?
admin
asked
in
Computer Networks
Dec 15, 2022
by
admin
767
views
drdocse-2022-paper2
computer-networks
cryptography
7-marks
descriptive
1
vote
0
answers
3
DRDO CSE 2022 Paper 2 | Question: 26
Suppose $\mathrm{A}$ and $\mathrm{B}$ use Diffie-Hellnian key exchange. Let the commonly agreed (i.e., global public) prime number $(q)=13$ and the primitive root $(\alpha)=6$. If $\text{A}$ chose the private value $\left(X_{A}\right)=5$ ... value $\left(X_{B}\right)=4$. Find the shared secret key $(\mathrm{K})$ between $\mathrm{A}$ and $\mathrm{B}$
admin
asked
in
Computer Networks
Dec 15, 2022
by
admin
359
views
drdocse-2022-paper2
computer-networks
cryptography
5-marks
descriptive
1
vote
1
answer
4
DRDO CSE 2022 Paper 2 | Question: 27
A transposition cipher (but not a rail-fence cipher) was used to produce the following ciphertext: $\text{X 2! H M E S S S E 2 Y T A 2 I I A}$ The key used was: $5 \; 2 \; 6 \; 3 \; 4 \; 1.$ What was the plaintext used (in English)?
admin
asked
in
Computer Networks
Dec 15, 2022
by
admin
416
views
drdocse-2022-paper2
computer-networks
cryptography
7-marks
descriptive
0
votes
0
answers
5
Introduction to Modern Cryptography
Let $\varepsilon>0$ be a constant. Say an encryption scheme is $\varepsilon$-perfectly secret if for every adversary $\mathcal{A}$ ... scheme that is $\varepsilon$-perfectly secret must have $|\mathcal{K}| \geq(1-2 \varepsilon) \cdot|\mathcal{M}| $
person
asked
in
Computer Networks
Oct 16, 2021
by
person
203
views
cryptography
0
votes
1
answer
6
UGC NET CSE | October 2020 | Part 2 | Question: 32
Using ‘RSA’ public key cryptosystem, if $p=3$, $q=11$ and $d=7$, find the value of $e$ and encrypt the number $’19’$ $20, 19$ $33,11$ $3, 28$ $77, 28$
go_editor
asked
in
Computer Networks
Nov 20, 2020
by
go_editor
1.9k
views
ugcnetcse-oct2020-paper2
computer-networks
network-security
cryptography
0
votes
2
answers
7
UGC NET CSE | October 2020 | Part 2 | Question: 54
Which among the following statement(s) is(are) true? A hash function takes a message of arbitrary length and generates a fixed length code A hash function takes a message of fixed length and generates a code of variable length A hash function may give same hash value ... below: $(i)$ only $(ii)$ and $(iii)$ only $(i)$ and $(iii)$ only $(ii)$ only
go_editor
asked
in
Computer Networks
Nov 20, 2020
by
go_editor
2.3k
views
ugcnetcse-oct2020-paper2
computer-networks
network-security
cryptography
2
votes
6
answers
8
UGC NET CSE | January 2017 | Part 2 | Question: 24
If $h$ is chosen from a universal collection of hash functions and is used to hash $n$ keys into a table of size $m$, where $n \leq m$, the expected number of collisions involving a particular key $x$ is less than __________. $1$ $1/n$ $1/m$ $n/m$
go_editor
asked
in
DS
Mar 24, 2020
by
go_editor
1.9k
views
ugcnetjan2017ii
cryptography
hashing
data-structures
2
votes
2
answers
9
ISRO2020-45
Avalanche effect in cryptography refers Large changes in cipher text when the keyword is changed minimally Large changes in cipher text when the plain text is changed Large Impact of keyword change to length of the cipher text None of the above
Satbir
asked
in
Computer Networks
Jan 13, 2020
by
Satbir
2.3k
views
isro-2020
computer-networks
cryptography
normal
1
vote
2
answers
10
ISRO2020-44
In a columnar transportation cipher, the plain text is the tomato is a plant in the night shade family , keyword is $\text{TOMATO}$ . The cipher text is $\text{ TINESAX / EOAHTFX / HTLTHEY / MAIIAIX / TAPNGDL / OSTNHMX }$ ... $\text{ EOAHTFX / TINESAX / HTLTHEY / MAIIAIX / TAPNGDL / OSTNHMX }$
Satbir
asked
in
Computer Networks
Jan 13, 2020
by
Satbir
3.4k
views
isro-2020
computer-networks
cryptography
normal
0
votes
1
answer
11
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 22 (Page No. 873)
A math class has 25 students. Assuming that all of the students were born in the first half of the year—between January 1st and June 30th— what is the probability that at least two students have the same birthday? Assume that nobody was born on leap day, so there are 181 possible birthdays.
ajaysoni1924
asked
in
Computer Networks
Mar 19, 2019
by
ajaysoni1924
648
views
computer-networks
tanenbaum
network-security
cryptography
0
votes
0
answers
12
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 33 (Page No. 874)
33. Two users can establish a shared secret key using the Diffie-Hellman algorithm, even if they have never met, share no secrets, and have no certificates (a) Explain how this algorithm is susceptible to a man-in-the-middle attack. (b) How would this susceptibility change if n or g were secret?
ajaysoni1924
asked
in
Computer Networks
Mar 19, 2019
by
ajaysoni1924
475
views
computer-networks
tanenbaum
network-security
cryptography
descriptive
0
votes
1
answer
13
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 32 (Page No. 874)
The Diffie-Hellman key exchange is being used to establish a secret key between Alice and Bob. Alice sends Bob (227, 5, 82). Bob responds with (125). Alice’s secret number, x, is 12, and Bob’s secret number, y, is 3. Show how Alice and Bob compute the secret key.
ajaysoni1924
asked
in
Computer Networks
Mar 19, 2019
by
ajaysoni1924
1.6k
views
computer-networks
tanenbaum
network-security
cryptography
0
votes
0
answers
14
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 25 (Page No. 873)
Alice wants to communicate with Bob, using public-key cryptography. She establishes a connection to someone she hopes is Bob. She asks him for his public key and he sends it to her in plaintext along with an X.509 certificate signed ... that Bob does not care who he is talking to (e.g., Bob is some kind of public service).
ajaysoni1924
asked
in
Computer Networks
Mar 19, 2019
by
ajaysoni1924
461
views
computer-networks
network-security
tanenbaum
cryptography
0
votes
1
answer
15
crypt arithmetic
If 356 + 123 = 512 .Then what is the value of 653 + 321? 1.215 2.974 3.1004 4.1304 How to solve these type questions?
screddy1313
asked
in
Quantitative Aptitude
Jan 27, 2019
by
screddy1313
888
views
numerical
cryptography
0
votes
1
answer
16
DH algorithm
How to calculate such a value: Please, someone explain because this is not possible on cal….!
Nandkishor3939
asked
in
Computer Networks
Jan 26, 2019
by
Nandkishor3939
440
views
computer-networks
cryptography
0
votes
0
answers
17
UPPCL AE 2018:49
If you are running a website, you purchase a digital certificate from a certification authority, and send your digital certificate to any web-client connecting to your website in order to: Provide your password to access your website Provide ... your website Announce that you actually guarantee security of the website Provide your private key to users connecting to your website
Lakshman Bhaiya
asked
in
Computer Networks
Jan 5, 2019
by
Lakshman Bhaiya
196
views
uppcl2018
computer-networks
cryptography
0
votes
0
answers
18
UPPCL AE 2018:48
Which of the following always happens during the $\text{SSL/TLS}$ handshake? The server and client already use a fixed set of cryptographic algorithms that are pre-decided by the system administrators The client sends client hello with a set of ... distribution and fixing of algorithms are done offline so there is no need for any exchange of algorithm or key during the handshake
Lakshman Bhaiya
asked
in
Computer Networks
Jan 5, 2019
by
Lakshman Bhaiya
330
views
uppcl2018
computer-networks
cryptography
1
vote
1
answer
19
Calculate mod in RSA algorithm
How to calculate Mod of a big number in RSA Like 5 raise to power 13 mod 77
Fida
asked
in
Computer Networks
Dec 10, 2018
by
Fida
1.8k
views
cryptography
computer-networks
0
votes
0
answers
20
Short cut to calculate d (private key) ins RSA algorithm
Please tell me shortcut to calculate d (private key) in RSA Algorithm
Fida
asked
in
Computer Networks
Nov 13, 2018
by
Fida
1.8k
views
rsa
algorithms
cryptography
0
votes
1
answer
21
Cryptography
Using RSA key crypto system with a = 1, b = 2 etc; value for encryption if prime value are p = 7 and q = 11, the legal value for secret key is . a)69 b)49 c)49 d)119
Shivangi Parashar 2
asked
in
Computer Networks
Oct 12, 2018
by
Shivangi Parashar 2
1.2k
views
cryptography
network-security
computer-networks
1
vote
1
answer
22
Diffie Hellman
Na462
asked
in
Computer Networks
Sep 15, 2018
by
Na462
1.0k
views
computer-networks
cryptography
0
votes
0
answers
23
Cryptography Topics in Syllabus
Are the following topics there in Syllabus? Digital Signatures Elgamal Digital Signature Scheme Schnorr Digital Signature Scheme Message Authentication Codes Data Encryption Standard (DES) Advanced Encryption Standard (AES) Triple DES Elliptic Curve Cryptography Secure Hash Algorithm (SHA) Message Authentication Codes(MAC)
Balaji Jegan
asked
in
Computer Networks
Aug 5, 2018
by
Balaji Jegan
530
views
cryptography
2
votes
2
answers
24
MadeEasy Full Length Test 2019: Computer Networks - Rsa Security Networks
In an RSA system, the public key of given user is e = 31 and n = 3599. The private key of user will be ________
piya
asked
in
Computer Networks
Jul 23, 2018
by
piya
11.8k
views
computer-networks
rsa-security-networks
cryptography
made-easy-test-series
0
votes
2
answers
25
UGC NET CSE | July 2018 | Part 2 | Question: 45
Match the following symmetric block ciphers with corresponding block and key sizes: ... $\text{a-ii; b-iv; c-iii; d-i}$ $\text{a-iv; b-ii; c-iii; d-i}$
Pooja Khatri
asked
in
Computer Networks
Jul 13, 2018
by
Pooja Khatri
1.5k
views
ugcnetcse-july2018-paper2
cryptography
computer-networks
0
votes
4
answers
26
UGC NET CSE | July 2018 | Part 2 | Question: 48
Decrypt the message "WTAAD" using the Caesar Cipher with key =15 LIPPS HELLO PLLEH DAATW
Pooja Khatri
asked
in
Others
Jul 13, 2018
by
Pooja Khatri
5.2k
views
ugcnetcse-july2018-paper2
cryptography
encryption-decryption
0
votes
1
answer
27
UGC NET CSE | July 2018 | Part 2 | Question: 50
Encrypt the Message "HELLO MY DEARZ" using Transposition Cipher with $Key \begin{cases} \text{Plain Text} & 2 4 1 3 \\ \text{Cipher Text} &1 2 3 4 \end{cases}$ HLLEO YM AEDRZ EHOLL ZYM RAED ELHL MDOY AZER ELHL DOMY ZAER
Pooja Khatri
asked
in
Computer Networks
Jul 13, 2018
by
Pooja Khatri
4.5k
views
ugcnetcse-july2018-paper2
cryptography
encryption-decryption
computer-networks
0
votes
0
answers
28
group theory and cryptography
How is group theory and cryptography linked?
Sri
asked
in
Others
May 2, 2018
by
Sri
394
views
group-theory
cryptography
2
votes
4
answers
29
ISRO2018-78
Which one of the following algorithm is not used in asymmetric key cryptography? RSA Algorithm Gillie-Hellman Algorithm Electronic Code Book Algorithm None of the above
Arjun
asked
in
Computer Networks
Apr 22, 2018
by
Arjun
14.2k
views
isro2018
computer-networks
network-security
cryptography
2
votes
0
answers
30
Cryptography - RSA Algorithm
In RSA Algorithm, we have public key(e,n) and private key(d,n). Sender side we encrypt plain text P as an integer between 0 and n-1 as follows: $P^{e}modn$ ... message P we are taking it as as integer between 0 and n-1. So, the P may not be coprime to n. Then how does the algorithm work?
Ashish Sharma 3
asked
in
Computer Networks
Jan 12, 2018
by
Ashish Sharma 3
1.0k
views
network-security
computer-networks
rsa-security-networks
cryptography
Page:
1
2
next »
Subscribe to GATE CSE 2024 Test Series
Subscribe to GO Classes for GATE CSE 2024
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
-tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
Post GATE 2024 Guidance [Counseling tips and resources]
GATE CSE 2024 Result Responses
[Project Contest] Pytorch backend support for MLCommons Cpp Inference implementation
Participating in MLCommons Inference v4.0 submission (deadline is February 23 12pm IST)
IIITH PGEE 2024 Test Series by GO Classes
Subjects
All categories
General Aptitude
(3.5k)
Engineering Mathematics
(10.4k)
Digital Logic
(3.6k)
Programming and DS
(6.2k)
Algorithms
(4.8k)
Theory of Computation
(6.9k)
Compiler Design
(2.5k)
Operating System
(5.2k)
Databases
(4.8k)
CO and Architecture
(4.0k)
Computer Networks
(4.9k)
Artificial Intelligence
(79)
Machine Learning
(48)
Data Mining and Warehousing
(25)
Non GATE
(1.4k)
Others
(2.7k)
Admissions
(683)
Exam Queries
(1.6k)
Tier 1 Placement Questions
(17)
Job Queries
(80)
Projects
(11)
Unknown Category
(870)
64.3k
questions
77.9k
answers
243k
comments
79.7k
users
Recent questions tagged cryptography
Recent Blog Comments
Hlo I'm Rupesh I got AIR 3485 in gate CS and AIR...
@Ajay Sasank here is the direct link...
Thank you for the post didi My GATE 2023 & 2024...
I Hope it helps 😊
Today's best post I seen thank you for motivation