Login
Register
@
Dark Mode
Profile
Edit my Profile
Messages
My favorites
Register
Activity
Q&A
Questions
Unanswered
Tags
Subjects
Users
Ask
Previous Years
Blogs
New Blog
Exams
Dark Mode
Recent questions tagged cryptography
0
votes
0
answers
1
Introduction to Modern Cryptography
Let $\varepsilon>0$ be a constant. Say an encryption scheme is $\varepsilon$-perfectly secret if for every adversary $\mathcal{A}$ ... scheme that is $\varepsilon$-perfectly secret must have $|\mathcal{K}| \geq(1-2 \varepsilon) \cdot|\mathcal{M}| $
person
asked
in
Computer Networks
Oct 16, 2021
by
person
121
views
cryptography
0
votes
1
answer
2
UGC NET CSE | October 2020 | Part 2 | Question: 32
Using ‘RSA’ public key cryptosystem, if $p=3$, $q=11$ and $d=7$, find the value of $e$ and encrypt the number $’19’$ $20, 19$ $33,11$ $3, 28$ $77, 28$
go_editor
asked
in
Computer Networks
Nov 20, 2020
by
go_editor
789
views
ugcnetcse-oct2020-paper2
computer-networks
network-security
cryptography
0
votes
2
answers
3
UGC NET CSE | October 2020 | Part 2 | Question: 54
Which among the following statement(s) is(are) true? A hash function takes a message of arbitrary length and generates a fixed length code A hash function takes a message of fixed length and generates a code of variable length A hash function may give same hash value for ... below: $(a)$ only $(b)$ and $(c)$ only $(a)$ and $(c)$ only $(b)$ only
go_editor
asked
in
Computer Networks
Nov 20, 2020
by
go_editor
1.6k
views
ugcnetcse-oct2020-paper2
computer-networks
network-security
cryptography
2
votes
6
answers
4
UGC NET CSE | January 2017 | Part 2 | Question: 24
If $h$ is chosen from a universal collection of hash functions and is used to hash $n$ keys into a table of size $m$, where $n \leq m$, the expected number of collisions involving a particular key $x$ is less than __________. $1$ $1/n$ $1/m$ $n/m$
go_editor
asked
in
DS
Mar 24, 2020
by
go_editor
1.1k
views
ugcnetjan2017ii
cryptography
hashing
data-structures
2
votes
2
answers
5
ISRO2020-45
Avalanche effect in cryptography refers Large changes in cipher text when the keyword is changed minimally Large changes in cipher text when the plain text is changed Large Impact of keyword change to length of the cipher text None of the above
Satbir
asked
in
Computer Networks
Jan 13, 2020
by
Satbir
1.4k
views
isro-2020
computer-networks
cryptography
normal
1
vote
2
answers
6
ISRO2020-44
In a columnar transportation cipher, the plain text is the tomato is a plant in the night shade family , keyword is $\text{TOMATO}$ . The cipher text is $\text{ TINESAX / EOAHTFX / HTLTHEY / MAIIAIX / TAPNGDL / OSTNHMX }$ ... $\text{ EOAHTFX / TINESAX / HTLTHEY / MAIIAIX / TAPNGDL / OSTNHMX }$
Satbir
asked
in
Computer Networks
Jan 13, 2020
by
Satbir
1.9k
views
isro-2020
computer-networks
cryptography
normal
0
votes
1
answer
7
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 22 (Page No. 873)
A math class has 25 students. Assuming that all of the students were born in the first half of the year—between January 1st and June 30th— what is the probability that at least two students have the same birthday? Assume that nobody was born on leap day, so there are 181 possible birthdays.
ajaysoni1924
asked
in
Computer Networks
Mar 19, 2019
by
ajaysoni1924
395
views
computer-networks
tanenbaum
network-security
cryptography
0
votes
0
answers
8
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 33 (Page No. 874)
33. Two users can establish a shared secret key using the Diffie-Hellman algorithm, even if they have never met, share no secrets, and have no certificates (a) Explain how this algorithm is susceptible to a man-in-the-middle attack. (b) How would this susceptibility change if n or g were secret?
ajaysoni1924
asked
in
Computer Networks
Mar 19, 2019
by
ajaysoni1924
298
views
computer-networks
tanenbaum
network-security
cryptography
descriptive
0
votes
1
answer
9
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 32 (Page No. 874)
The Diffie-Hellman key exchange is being used to establish a secret key between Alice and Bob. Alice sends Bob (227, 5, 82). Bob responds with (125). Alice’s secret number, x, is 12, and Bob’s secret number, y, is 3. Show how Alice and Bob compute the secret key.
ajaysoni1924
asked
in
Computer Networks
Mar 19, 2019
by
ajaysoni1924
969
views
computer-networks
tanenbaum
network-security
cryptography
0
votes
0
answers
10
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 25 (Page No. 873)
Alice wants to communicate with Bob, using public-key cryptography. She establishes a connection to someone she hopes is Bob. She asks him for his public key and he sends it to her in plaintext along with an X.509 certificate signed ... that Bob does not care who he is talking to (e.g., Bob is some kind of public service).
ajaysoni1924
asked
in
Computer Networks
Mar 19, 2019
by
ajaysoni1924
305
views
computer-networks
network-security
tanenbaum
cryptography
0
votes
1
answer
11
crypt arithmetic
If 356 + 123 = 512 .Then what is the value of 653 + 321? 1.215 2.974 3.1004 4.1304 How to solve these type questions?
screddy1313
asked
in
Quantitative Aptitude
Jan 27, 2019
by
screddy1313
679
views
numerical
cryptography
0
votes
1
answer
12
DH algorithm
How to calculate such a value: Please, someone explain because this is not possible on cal….!
Nandkishor3939
asked
in
Computer Networks
Jan 26, 2019
by
Nandkishor3939
264
views
computer-networks
cryptography
0
votes
0
answers
13
UPPCL AE 2018:49
If you are running a website, you purchase a digital certificate from a certification authority, and send your digital certificate to any web-client connecting to your website in order to: Provide your password to access your website Provide ... your website Announce that you actually guarantee security of the website Provide your private key to users connecting to your website
Lakshman Patel RJIT
asked
in
Computer Networks
Jan 5, 2019
by
Lakshman Patel RJIT
104
views
uppcl2018
computer-networks
cryptography
0
votes
0
answers
14
UPPCL AE 2018:48
Which of the following always happens during the $\text{SSL/TLS}$ handshake? The server and client already use a fixed set of cryptographic algorithms that are pre-decided by the system administrators The client sends client hello with a set of ... distribution and fixing of algorithms are done offline so there is no need for any exchange of algorithm or key during the handshake
Lakshman Patel RJIT
asked
in
Computer Networks
Jan 5, 2019
by
Lakshman Patel RJIT
107
views
uppcl2018
computer-networks
cryptography
1
vote
1
answer
15
Calculate mod in RSA algorithm
How to calculate Mod of a big number in RSA Like 5 raise to power 13 mod 77
Fida
asked
in
Computer Networks
Dec 10, 2018
by
Fida
994
views
cryptography
computer-networks
0
votes
0
answers
16
Short cut to calculate d (private key) ins RSA algorithm
Please tell me shortcut to calculate d (private key) in RSA Algorithm
Fida
asked
in
Computer Networks
Nov 13, 2018
by
Fida
1.4k
views
rsa
algorithms
cryptography
0
votes
1
answer
17
Cryptography
Using RSA key crypto system with a = 1, b = 2 etc; value for encryption if prime value are p = 7 and q = 11, the legal value for secret key is . a)69 b)49 c)49 d)119
Shivangi Parashar 2
asked
in
Computer Networks
Oct 12, 2018
by
Shivangi Parashar 2
986
views
cryptography
network-security
computer-networks
1
vote
1
answer
18
Diffie Hellman
Na462
asked
in
Computer Networks
Sep 15, 2018
by
Na462
661
views
computer-networks
cryptography
0
votes
0
answers
19
Cryptography Topics in Syllabus
Are the following topics there in Syllabus? Digital Signatures Elgamal Digital Signature Scheme Schnorr Digital Signature Scheme Message Authentication Codes Data Encryption Standard (DES) Advanced Encryption Standard (AES) Triple DES Elliptic Curve Cryptography Secure Hash Algorithm (SHA) Message Authentication Codes(MAC)
Balaji Jegan
asked
in
Computer Networks
Aug 5, 2018
by
Balaji Jegan
431
views
cryptography
2
votes
2
answers
20
MadeEasy Full Length Test 2019: Computer Networks - Rsa Security Networks
In an RSA system, the public key of given user is e = 31 and n = 3599. The private key of user will be ________
piya
asked
in
Computer Networks
Jul 23, 2018
by
piya
7.8k
views
computer-networks
rsa-security-networks
cryptography
made-easy-test-series
0
votes
1
answer
21
UGC NET CSE | July 2018 | Part 2 | Question: 45
Match the following symmetric block ciphers with corresponding block and key sizes: ... $\text{a-ii; b-iv; c-iii; d-i}$ $\text{a-iv; b-ii; c-iii; d-i}$
Pooja Khatri
asked
in
Computer Networks
Jul 13, 2018
by
Pooja Khatri
1.2k
views
ugcnetcse-july2018-paper2
cryptography
computer-networks
0
votes
4
answers
22
UGC NET CSE | July 2018 | Part 2 | Question: 48
Decrypt the message "WTAAD" using the Caesar Cipher with key =15 LIPPS HELLO PLLEH DAATW
Pooja Khatri
asked
in
Others
Jul 13, 2018
by
Pooja Khatri
4.0k
views
ugcnetcse-july2018-paper2
cryptography
encryption-decryption
0
votes
1
answer
23
UGC NET CSE | July 2018 | Part 2 | Question: 50
Encrypt the Message "HELLO MY DEARZ" using Transposition Cipher with $Key \begin{cases} \text{Plain Text} & 2 4 1 3 \\ \text{Cipher Text} &1 2 3 4 \end{cases}$ HLLEO YM AEDRZ EHOLL ZYM RAED ELHL MDOY AZER ELHL DOMY ZAER
Pooja Khatri
asked
in
Computer Networks
Jul 13, 2018
by
Pooja Khatri
3.7k
views
ugcnetcse-july2018-paper2
cryptography
encryption-decryption
computer-networks
0
votes
0
answers
24
group theory and cryptography
How is group theory and cryptography linked?
Sri
asked
in
Others
May 2, 2018
by
Sri
270
views
group-theory
cryptography
1
vote
4
answers
25
ISRO2018-78
Which one of the following algorithm is not used in asymmetric key cryptography? RSA Algorithm Gillie-Hellman Algorithm Electronic Code Book Algorithm None of the above
Arjun
asked
in
Computer Networks
Apr 22, 2018
by
Arjun
12.3k
views
isro2018
computer-networks
network-security
cryptography
2
votes
0
answers
26
Cryptography - RSA Algorithm
In RSA Algorithm, we have public key(e,n) and private key(d,n). Sender side we encrypt plain text P as an integer between 0 and n-1 as follows: $P^{e}modn$ ... message P we are taking it as as integer between 0 and n-1. So, the P may not be coprime to n. Then how does the algorithm work?
Ashish Sharma 3
asked
in
Computer Networks
Jan 12, 2018
by
Ashish Sharma 3
834
views
network-security
computer-networks
rsa-security-networks
cryptography
0
votes
1
answer
27
MadeEasy Test Series: Computer Networks - Network Security
Consider the following statements with respect to digital signatures: S1: Digital signature ensures authenticity of the sender but not integrity of the message. S2: A single secret key can be used by the sender to sign multiple ... Both RSA cryptosystem and RSA digital signature scheme uses same set of keys. Which of the following is true?
Appu B
asked
in
Computer Networks
Dec 3, 2017
by
Appu B
1.4k
views
made-easy-test-series
computer-networks
cryptography
network-security
rsa-security-networks
0
votes
1
answer
28
Doubt!
You generate a perfectly random key K. You send two messages, M1 and M2, encrypted with K (C1 = K xor M1 and C2 = K xor M2). Does sending C2 leak information about M1 and M2?
vijay_jr
asked
in
Computer Networks
Dec 2, 2017
by
vijay_jr
180
views
cryptography
network-security
2
votes
1
answer
29
Networking
Using RSA, choose p = 3 and q = 11, and encrypt “DOG” as one message m.
reena_kandari
asked
in
Computer Networks
Jul 4, 2017
by
reena_kandari
461
views
cryptography
38
votes
3
answers
30
GATE CSE 2017 Set 1 | Question: 15
A sender $S$ sends a message $m$ to receiver $R$, which is digitally signed by $S$ with its private key. In this scenario, one or more of the following security violations can take place. $S$ ... with a fraudulent message Which of the following are possible security violations? I and II only I only II only II and III only
Arjun
asked
in
Computer Networks
Feb 14, 2017
by
Arjun
10.5k
views
gatecse-2017-set1
computer-networks
cryptography
normal
network-security
out-of-gate-syllabus
Page:
1
2
next »
Subscribe to GATE CSE 2023 Test Series
Subscribe to GO Classes for GATE CSE 2023
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
-tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
Aptitude Overflow Book
Participate in Machine Learning benchmarking
GATE Overflow Tikz Templates
UPSC One Time Registration OTR Online Form 2022
DRDO CEPTAM 10 Online Form 2022
Subjects
All categories
General Aptitude
(2.4k)
Engineering Mathematics
(8.9k)
Digital Logic
(3.2k)
Programming and DS
(5.7k)
Algorithms
(4.5k)
Theory of Computation
(6.5k)
Compiler Design
(2.2k)
Operating System
(4.8k)
Databases
(4.4k)
CO and Architecture
(3.6k)
Computer Networks
(4.4k)
Non GATE
(1.2k)
Others
(2.5k)
Admissions
(644)
Exam Queries
(838)
Tier 1 Placement Questions
(17)
Job Queries
(72)
Projects
(9)
Unknown Category
(851)
Recent questions tagged cryptography
Recent Blog Comments
@Arjun @Deepak Sir, In Test Schedule google...
sir is this for gate? it has way more questions...
https://gateoverflow.in/tag/gate2010 this link is...
previous years than GATE 2010 paper
Which link are you referring to?