The Gateway to Computer Science Excellence
For all GATE CSE Questions
Toggle navigation
Facebook Login
or
Email or Username
Password
Remember
Login
Register

I forgot my password
Activity
Questions
Unanswered
Tags
Subjects
Users
Ask
Prev
Blogs
New Blog
Exams
First time here? Checkout the
FAQ
!
x
×
Close
Use the google search bar on side panel. It searches through all previous GATE/other questions. For hardcopy of previous year questions please see
here
Recent questions tagged cryptography
0
votes
0
answers
1
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 22 (Page No. 873)
A math class has 25 students. Assuming that all of the students were born in the first half of the year—between January 1st and June 30th— what is the probability that at least two students have the same birthday? Assume that nobody was born on leap day, so there are 181 possible birthdays.
asked
Mar 19
in
Computer Networks
by
ajaysoni1924
Loyal
(
9.5k
points)

29
views
computernetworks
networksecurity
cryptography
0
votes
0
answers
2
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 33 (Page No. 874)
33. Two users can establish a shared secret key using the DiffieHellman algorithm, even if they have never met, share no secrets, and have no certificates (a) Explain how this algorithm is susceptible to a maninthemiddle attack. (b) How would this susceptibility change if n or g were secret?
asked
Mar 19
in
Computer Networks
by
ajaysoni1924
Loyal
(
9.5k
points)

18
views
computernetworks
networksecurity
cryptography
descriptive
0
votes
0
answers
3
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 32 (Page No. 874)
The DiffieHellman key exchange is being used to establish a secret key between Alice and Bob. Alice sends Bob (227, 5, 82). Bob responds with (125). Alice’s secret number, x, is 12, and Bob’s secret number, y, is 3. Show how Alice and Bob compute the secret key.
asked
Mar 19
in
Computer Networks
by
ajaysoni1924
Loyal
(
9.5k
points)

22
views
computernetworks
networksecurity
cryptography
0
votes
0
answers
4
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 25 (Page No. 873)
Alice wants to communicate with Bob, using publickey cryptography. She establishes a connection to someone she hopes is Bob. She asks him for his public key and he sends it to her in plaintext along with an X.509 certificate signed ... that Bob does not care who he is talking to (e.g., Bob is some kind of public service).
asked
Mar 19
in
Computer Networks
by
ajaysoni1924
Loyal
(
9.5k
points)

15
views
computernetworks
networksecurity
tanenbaum
cryptography
0
votes
1
answer
5
crypt arithmetic
If 356 + 123 = 512 .Then what is the value of 653 + 321? 1.215 2.974 3.1004 4.1304 How to solve these type questions?
asked
Jan 27
in
Numerical Ability
by
screddy1313
(
455
points)

176
views
numerical
cryptography
0
votes
1
answer
6
DH algorithm
How to calculate such a value: Please, someone explain because this is not possible on cal….!
asked
Jan 26
in
Computer Networks
by
Nandkishor3939
Active
(
1k
points)

68
views
computernetworks
cryptography
0
votes
1
answer
7
Calculate mod in RSA algorithm
How to calculate Mod of a big number in RSA Like 5 raise to power 13 mod 77
asked
Dec 10, 2018
in
Computer Networks
by
Fida
(
63
points)

194
views
cryptography
computernetworks
0
votes
0
answers
8
Short cut to calculate d (private key) ins RSA algorithm
Please tell me shortcut to calculate d (private key) in RSA Algorithm
asked
Nov 13, 2018
in
Computer Networks
by
Fida
(
63
points)

218
views
rsa
algorithms

cryptography
0
votes
1
answer
9
Cryptography
Using RSA key crypto system with a = 1, b = 2 etc; value for encryption if prime value are p = 7 and q = 11, the legal value for secret key is . a)69 b)49 c)49 d)119
asked
Oct 12, 2018
in
Computer Networks
by
Shivangi Parashar 2
(
257
points)

177
views
cryptography
networksecurity
computernetworks
0
votes
1
answer
10
Diffie Hellman
asked
Sep 15, 2018
in
Computer Networks
by
Na462
Loyal
(
6.6k
points)

126
views
computernetworks
cryptography
0
votes
0
answers
11
Cryptography Topics in Syllabus
Are the following topics there in Syllabus? Digital Signatures Elgamal Digital Signature Scheme Schnorr Digital Signature Scheme Message Authentication Codes Data Encryption Standard (DES) Advanced Encryption Standard (AES) Triple DES Elliptic Curve Cryptography Secure Hash Algorithm (SHA) Message Authentication Codes(MAC)
asked
Aug 5, 2018
in
Computer Networks
by
Balaji Jegan
Active
(
4.8k
points)

79
views
cryptography
+2
votes
2
answers
12
MadeEasy Full Length Test 2019: Computer Networks  Rsa Security Networks
In an RSA system, the public key of given user is e = 31 and n = 3599. The private key of user will be ________
asked
Jul 23, 2018
in
Computer Networks
by
piya
(
191
points)

986
views
computernetworks
rsasecuritynetworks
cryptography
madeeasytestseries2019
madeeasytestseries
0
votes
1
answer
13
UGCNETJuly2018II45
Match the following symmetric block ciphers with corresponding block and key sizes: List  I List II a DES i block size 64 and key size ranges between 32 and 448 b IDEA ii block size 64 and key size 64 c BLOW FISH iii block size 128 and key sizes 128, 192, 256 d AES iv block size 64 and key ... i; diii aii; biv; ci; diii aii; biv; ciii; di aiv; bii; ciii; di
asked
Jul 13, 2018
in
Others
by
Pooja Khatri
Boss
(
10.7k
points)

343
views
ugcnetjuly2018ii
cryptography
0
votes
4
answers
14
UGCNETJuly2018II48
Decrypt the message "WTAAD" using the Caesar Cipher with key =15 LIPPS HELLO PLLEH DAATW
asked
Jul 13, 2018
in
Others
by
Pooja Khatri
Boss
(
10.7k
points)

930
views
ugcnetjuly2018ii
cryptography
encryption
0
votes
2
answers
15
UGCNETJuly2018II50
Encrypt the Message "HELLO MY DEARZ" using Transposition Cipher with $Key \begin{cases} \text{Plain Text} & 2 4 3 1 \\ \text{Cipher Text} &1 2 3 4 \end{cases}$ HLLEO YM AEDRZ EHOLL ZYM RAED ELHL MDOY AZER ELHL DOMY ZAER
asked
Jul 13, 2018
in
Others
by
Pooja Khatri
Boss
(
10.7k
points)

1.1k
views
ugcnetjuly2018ii
cryptography
encryption
0
votes
0
answers
16
group theory and cryptography
How is group theory and cryptography linked?
asked
May 2, 2018
in
Others
by
Sri
(
49
points)

55
views
groups
cryptography
+2
votes
0
answers
17
Cryptography  RSA Algorithm
In RSA Algorithm, we have public key(e,n) and private key(d,n). Sender side we encrypt plain text P as an integer between 0 and n1 as follows: $P^{e}modn$ ... message P we are taking it as as integer between 0 and n1. So, the P may not be coprime to n. Then how does the algorithm work?
asked
Jan 12, 2018
in
Computer Networks
by
Ashish Sharma 3
(
331
points)

450
views
networksecurity
computernetworks
rsasecuritynetworks
cryptography
0
votes
1
answer
18
MadeEasy Test Series: Computer Networks  Network Security
Consider the following statements with respect to digital signatures: S1: Digital signature ensures authenticity of the sender but not integrity of the message. S2: A single secret key can be used by the sender to sign multiple ... Both RSA cryptosystem and RSA digital signature scheme uses same set of keys. Which of the following is true?
asked
Dec 3, 2017
in
Computer Networks
by
Appu B
(
259
points)

138
views
madeeasytestseries
computernetworks
cryptography
networksecurity
rsasecuritynetworks
0
votes
1
answer
19
Doubt!
You generate a perfectly random key K. You send two messages, M1 and M2, encrypted with K (C1 = K xor M1 and C2 = K xor M2). Does sending C2 leak information about M1 and M2?
asked
Dec 2, 2017
in
Computer Networks
by
vijay_jr
Active
(
1.1k
points)

76
views
cryptography
networksecurity
+2
votes
1
answer
20
Networking
Using RSA, choose p = 3 and q = 11, and encrypt “DOG” as one message m.
asked
Jul 4, 2017
in
Computer Networks
by
reena_kandari
Loyal
(
7.6k
points)

146
views
cryptography
+23
votes
3
answers
21
GATE2017115
A sender $S$ sends a message $m$ to receiver $R$, which is digitally signed by $S$ with its private key. In this scenario, one or more of the following security violations can take place. $S$ can launch a birthday attack to replace $m$ with a ... $m$ with a fraudulent message Which of the following are possible security violations? I and II only I only II only II and III only
asked
Feb 14, 2017
in
Computer Networks
by
Arjun
Veteran
(
407k
points)

4.4k
views
gate20171
computernetworks
cryptography
normal
0
votes
1
answer
22
MadeEasy Subject Test: Computer Networks  Cryptography
asked
Feb 7, 2017
in
Computer Networks
by
pkb
Junior
(
589
points)

98
views
madeeasytestseries
computernetworks
cryptography
+1
vote
1
answer
23
MadeEasy Subject Test: Computer Networks  Cryptography
asked
Jan 12, 2017
in
Computer Networks
by
Akanksha Kesarwani
Junior
(
945
points)

88
views
computernetworks
madeeasytestseries
cryptography
0
votes
1
answer
24
Ace Test Series: Computer Networks  Cryptography
asked
Jan 1, 2017
in
Computer Networks
by
chaser
(
321
points)

80
views
acetestseries
computernetworks
cryptography
+3
votes
2
answers
25
UGCNETAUG2016III30
The plain text message $BAHI$ encrypted with $RSA$ algorithm using $e = 3, d = 7$ and $n = 33$ and the characters of the message are encoded using the values $00$ to $25$ for letters A to Z. Suppose character by character encryption was implemented. Then, the Cipher Text message is _____. ABHI HAQC IHBA BHQC
asked
Oct 1, 2016
in
Computer Networks
by
makhdoom ghaya
Boss
(
29.3k
points)

1.8k
views
ugcnetaug2016iii
cryptography
computernetworks
+3
votes
1
answer
26
UGCNETDec2013III32
Find the false statement: In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. The symmetric cipher DES (Data Encryption Standard) was widely used in the industry for security product. The AES (Advanced ... key lengths of size 56 bits and 124 bits. Public key algorithms use two different keys for Encryption and Decryption
asked
Jul 28, 2016
in
Computer Networks
by
jothee
Veteran
(
96.1k
points)

577
views
ugcnetdec2013iii
computernetworks
cryptography
+1
vote
1
answer
27
UGCNETSep2013III57
If user A wants to send an encrypted message to user B, the plain text of A is encrypted with the Public key of user A Public key of user B Private key of user A Private key of user B
asked
Jul 24, 2016
in
Others
by
jothee
Veteran
(
96.1k
points)

622
views
ugcnetsep2013iii
cryptography
encryption
+1
vote
2
answers
28
UGCNETSep2013III3
Assume that each alphabet can have a value between 0 to 9 in a cryptoarithmetic problem Which of the following statements is true? No two alphabets can have the same numeric value Any two alphabets can have the same numeric value D=0 D=1 I and III I and IV II and III II and IV
asked
Jul 22, 2016
in
Others
by
jothee
Veteran
(
96.1k
points)

539
views
ugcnetsep2013iii
cryptography
cryptarithmetic
+2
votes
3
answers
29
UGCNETDec2014II30
How many distinct stages are there in $DES$ algorithm, which is parameterized by a $56$bit key ? $16$ $17$ $18$ $19$
asked
Jul 21, 2016
in
Computer Networks
by
makhdoom ghaya
Boss
(
29.3k
points)

1.8k
views
ugcnetdec2014ii
computernetworks
cryptography
+1
vote
1
answer
30
UGCNETSep2013II3
Which of the following substitution technique have the relationship between a character in the plaintext and a character in the ciphertext as onetomany? Monoalphabetic Polyalphabetic Transpositional None of the above
asked
Jul 20, 2016
in
Others
by
jothee
Veteran
(
96.1k
points)

944
views
ugcnetsep2013ii
cryptography
encryption
Page:
1
2
next »
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
IIITH Interview Experience
Thanks GO!!
IIIT Hyerabad Interview Expeience  MS by Research in CSE
The day that made me an IIScian :)
Unanswered Previous year GATE/TIFR questions
Follow @csegate
Recent questions tagged cryptography
Recent Blog Comments
thanku :)
thanku :)
Congratulations :)
Congratulations 😊 👍
Thank you bro @Shaik
49,532
questions
54,126
answers
187,326
comments
71,046
users