The Gateway to Computer Science Excellence
For all GATE CSE Questions
Toggle navigation
Facebook Login
or
Email or Username
Password
Remember
Login
Register

I forgot my password
Activity
Questions
Unanswered
Tags
Subjects
Users
Ask
Prev
Blogs
New Blog
Exams
Recent questions tagged cryptography
+2
votes
1
answer
1
ISRO202045
Avalanche effect in cryptography refers Large change in cipher text when the keyword is changed minimally Large changes in cipher text when the plain text is changed Large Impact of keyword change to length of the cipher text None of the above
asked
Jan 13
in
Computer Networks
by
Satbir
Boss
(
23.8k
points)

144
views
isro2020
computernetworks
cryptography
normal
+1
vote
2
answers
2
ISRO202044
In a columnar transportation cipher, the plain text is “the tomato is a plant in the night shade family”, keyword is “$TOMATO$”. The cipher text is $”TINESAX/EOAHTFX/HTLTHEY/MAIIAIX/TAPNGDL/OSTNHMX”$ $”TINESAX/EOAHTFX/MAIIAIX/HTLTHEY/TAPNGDL/OSTNHMX”$ $”TINESAX/EOAHTFX/HTLTHEY/MAIIAIX/OSTNHMX/TAPNGDL”$ $”EOAHTFX/TINESAX/HTLTHEY/MAIIAIX/TAPNGDL/OSTNHMX”$
asked
Jan 13
in
Computer Networks
by
Satbir
Boss
(
23.8k
points)

114
views
isro2020
computernetworks
cryptography
normal
0
votes
0
answers
3
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 22 (Page No. 873)
A math class has 25 students. Assuming that all of the students were born in the first half of the year—between January 1st and June 30th— what is the probability that at least two students have the same birthday? Assume that nobody was born on leap day, so there are 181 possible birthdays.
asked
Mar 19, 2019
in
Computer Networks
by
ajaysoni1924
Boss
(
10.8k
points)

59
views
computernetworks
networksecurity
cryptography
0
votes
0
answers
4
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 33 (Page No. 874)
33. Two users can establish a shared secret key using the DiffieHellman algorithm, even if they have never met, share no secrets, and have no certificates (a) Explain how this algorithm is susceptible to a maninthemiddle attack. (b) How would this susceptibility change if n or g were secret?
asked
Mar 19, 2019
in
Computer Networks
by
ajaysoni1924
Boss
(
10.8k
points)

43
views
computernetworks
networksecurity
cryptography
descriptive
0
votes
1
answer
5
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 32 (Page No. 874)
The DiffieHellman key exchange is being used to establish a secret key between Alice and Bob. Alice sends Bob (227, 5, 82). Bob responds with (125). Alice’s secret number, x, is 12, and Bob’s secret number, y, is 3. Show how Alice and Bob compute the secret key.
asked
Mar 19, 2019
in
Computer Networks
by
ajaysoni1924
Boss
(
10.8k
points)

73
views
computernetworks
networksecurity
cryptography
0
votes
0
answers
6
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 25 (Page No. 873)
Alice wants to communicate with Bob, using publickey cryptography. She establishes a connection to someone she hopes is Bob. She asks him for his public key and he sends it to her in plaintext along with an X.509 certificate signed ... that Bob does not care who he is talking to (e.g., Bob is some kind of public service).
asked
Mar 19, 2019
in
Computer Networks
by
ajaysoni1924
Boss
(
10.8k
points)

41
views
computernetworks
networksecurity
tanenbaum
cryptography
0
votes
1
answer
7
crypt arithmetic
If 356 + 123 = 512 .Then what is the value of 653 + 321? 1.215 2.974 3.1004 4.1304 How to solve these type questions?
asked
Jan 27, 2019
in
Numerical Ability
by
screddy1313
(
481
points)

204
views
numerical
cryptography
0
votes
1
answer
8
DH algorithm
How to calculate such a value: Please, someone explain because this is not possible on cal….!
asked
Jan 26, 2019
in
Computer Networks
by
Nandkishor3939
Active
(
1.3k
points)

86
views
computernetworks
cryptography
0
votes
1
answer
9
Calculate mod in RSA algorithm
How to calculate Mod of a big number in RSA Like 5 raise to power 13 mod 77
asked
Dec 10, 2018
in
Computer Networks
by
Fida
(
69
points)

262
views
cryptography
computernetworks
0
votes
0
answers
10
Short cut to calculate d (private key) ins RSA algorithm
Please tell me shortcut to calculate d (private key) in RSA Algorithm
asked
Nov 13, 2018
in
Computer Networks
by
Fida
(
69
points)

305
views
rsa
algorithms

cryptography
0
votes
1
answer
11
Cryptography
Using RSA key crypto system with a = 1, b = 2 etc; value for encryption if prime value are p = 7 and q = 11, the legal value for secret key is . a)69 b)49 c)49 d)119
asked
Oct 12, 2018
in
Computer Networks
by
Shivangi Parashar 2
(
307
points)

224
views
cryptography
networksecurity
computernetworks
+1
vote
1
answer
12
Diffie Hellman
asked
Sep 15, 2018
in
Computer Networks
by
Na462
Loyal
(
7k
points)

179
views
computernetworks
cryptography
0
votes
0
answers
13
Cryptography Topics in Syllabus
Are the following topics there in Syllabus? Digital Signatures Elgamal Digital Signature Scheme Schnorr Digital Signature Scheme Message Authentication Codes Data Encryption Standard (DES) Advanced Encryption Standard (AES) Triple DES Elliptic Curve Cryptography Secure Hash Algorithm (SHA) Message Authentication Codes(MAC)
asked
Aug 5, 2018
in
Computer Networks
by
Balaji Jegan
Active
(
5k
points)

124
views
cryptography
+2
votes
2
answers
14
MadeEasy Full Length Test 2019: Computer Networks  Rsa Security Networks
In an RSA system, the public key of given user is e = 31 and n = 3599. The private key of user will be ________
asked
Jul 23, 2018
in
Computer Networks
by
piya
(
191
points)

1.2k
views
computernetworks
rsasecuritynetworks
cryptography
madeeasytestseries2019
madeeasytestseries
0
votes
1
answer
15
UGCNETJuly2018II45
Match the following symmetric block ciphers with corresponding block and key sizes: List  I List II a DES i block size 64 and key size ranges between 32 and 448 b IDEA ii block size 64 and key size 64 c BLOW FISH iii block size 128 and key sizes 128, 192, 256 d AES iv block size 64 and key ... i; diii aii; biv; ci; diii aii; biv; ciii; di aiv; bii; ciii; di
asked
Jul 13, 2018
in
Others
by
Pooja Khatri
Boss
(
10.9k
points)

433
views
ugcnetjuly2018ii
cryptography
0
votes
4
answers
16
UGCNETJuly2018II48
Decrypt the message "WTAAD" using the Caesar Cipher with key =15 LIPPS HELLO PLLEH DAATW
asked
Jul 13, 2018
in
Others
by
Pooja Khatri
Boss
(
10.9k
points)

1.2k
views
ugcnetjuly2018ii
cryptography
encryption
0
votes
2
answers
17
UGCNETJuly2018II50
Encrypt the Message "HELLO MY DEARZ" using Transposition Cipher with $Key \begin{cases} \text{Plain Text} & 2 4 3 1 \\ \text{Cipher Text} &1 2 3 4 \end{cases}$ HLLEO YM AEDRZ EHOLL ZYM RAED ELHL MDOY AZER ELHL DOMY ZAER
asked
Jul 13, 2018
in
Others
by
Pooja Khatri
Boss
(
10.9k
points)

1.4k
views
ugcnetjuly2018ii
cryptography
encryption
0
votes
0
answers
18
group theory and cryptography
How is group theory and cryptography linked?
asked
May 2, 2018
in
Others
by
Sri
(
55
points)

65
views
grouptheory
cryptography
+1
vote
4
answers
19
ISRO201878
Which one of the following algorithm is not used in asymmetric key cryptography? RSA Algorithm GillieHellman Algorithm Electronic Code Book Algorithm None of the above
asked
Apr 22, 2018
in
Computer Networks
by
Arjun
Veteran
(
431k
points)

1.1k
views
isro2018
computernetworks
networksecurity
cryptography
+2
votes
0
answers
20
Cryptography  RSA Algorithm
In RSA Algorithm, we have public key(e,n) and private key(d,n). Sender side we encrypt plain text P as an integer between 0 and n1 as follows: $P^{e}modn$ ... message P we are taking it as as integer between 0 and n1. So, the P may not be coprime to n. Then how does the algorithm work?
asked
Jan 12, 2018
in
Computer Networks
by
Ashish Sharma 3
(
341
points)

516
views
networksecurity
computernetworks
rsasecuritynetworks
cryptography
0
votes
1
answer
21
MadeEasy Test Series: Computer Networks  Network Security
Consider the following statements with respect to digital signatures: S1: Digital signature ensures authenticity of the sender but not integrity of the message. S2: A single secret key can be used by the sender to sign multiple ... Both RSA cryptosystem and RSA digital signature scheme uses same set of keys. Which of the following is true?
asked
Dec 3, 2017
in
Computer Networks
by
Appu B
(
259
points)

195
views
madeeasytestseries
computernetworks
cryptography
networksecurity
rsasecuritynetworks
0
votes
1
answer
22
Doubt!
You generate a perfectly random key K. You send two messages, M1 and M2, encrypted with K (C1 = K xor M1 and C2 = K xor M2). Does sending C2 leak information about M1 and M2?
asked
Dec 2, 2017
in
Computer Networks
by
vijay_jr
Active
(
1.1k
points)

82
views
cryptography
networksecurity
+2
votes
1
answer
23
Networking
Using RSA, choose p = 3 and q = 11, and encrypt “DOG” as one message m.
asked
Jul 4, 2017
in
Computer Networks
by
reena_kandari
Loyal
(
8.3k
points)

153
views
cryptography
+33
votes
3
answers
24
GATE2017115
A sender $S$ sends a message $m$ to receiver $R$, which is digitally signed by $S$ with its private key. In this scenario, one or more of the following security violations can take place. $S$ can launch a birthday attack to replace $m$ with a ... $m$ with a fraudulent message Which of the following are possible security violations? I and II only I only II only II and III only
asked
Feb 14, 2017
in
Computer Networks
by
Arjun
Veteran
(
431k
points)

5.2k
views
gate20171
computernetworks
cryptography
normal
0
votes
1
answer
25
MadeEasy Subject Test: Computer Networks  Cryptography
asked
Feb 7, 2017
in
Computer Networks
by
pkb
Junior
(
621
points)

113
views
madeeasytestseries
computernetworks
cryptography
0
votes
1
answer
26
Ace Test Series: Computer Networks  Cryptography
asked
Jan 1, 2017
in
Computer Networks
by
chaser
(
321
points)

93
views
acetestseries
computernetworks
cryptography
+3
votes
2
answers
27
UGCNETAUG2016III30
The plain text message $BAHI$ encrypted with $RSA$ algorithm using $e = 3, d = 7$ and $n = 33$ and the characters of the message are encoded using the values $00$ to $25$ for letters A to Z. Suppose character by character encryption was implemented. Then, the Cipher Text message is _____. ABHI HAQC IHBA BHQC
asked
Oct 1, 2016
in
Computer Networks
by
makhdoom ghaya
Boss
(
30.7k
points)

1.9k
views
ugcnetaug2016iii
cryptography
computernetworks
0
votes
1
answer
28
Cryptography
what is the difference between public key and private key ?
asked
Sep 1, 2016
in
Computer Networks
by
Karthik Akula
(
447
points)

335
views
computernetworks
cryptography
+3
votes
1
answer
29
UGCNETDec2013III32
Find the false statement: In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. The symmetric cipher DES (Data Encryption Standard) was widely used in the industry for security product. The AES (Advanced ... key lengths of size 56 bits and 124 bits. Public key algorithms use two different keys for Encryption and Decryption
asked
Jul 28, 2016
in
Computer Networks
by
jothee
Veteran
(
105k
points)

621
views
ugcnetdec2013iii
computernetworks
cryptography
+1
vote
1
answer
30
UGCNETSep2013III57
If user A wants to send an encrypted message to user B, the plain text of A is encrypted with the Public key of user A Public key of user B Private key of user A Private key of user B
asked
Jul 24, 2016
in
Others
by
jothee
Veteran
(
105k
points)

685
views
ugcnetsep2013iii
cryptography
encryption
Page:
1
2
next »
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
ISRO CSE 2020 PAPER ANALYSE
BARC OCES/DGFS 2020
ISI CMI PDF by GATE Overflow
Calculus Important Points
Management Trainee Recruitment COAL INDIA 2020
Follow @csegate
Recent questions tagged cryptography
Recent Blog Comments
@ben10 There are two questions in it, as per time...
Is official answer key out ??
https://gateoverflow.in/331364/isro202036 ,...
For the postorder to preorder conversion, please...
Getting 111 marks. If big endian option changes...
50,737
questions
57,284
answers
198,181
comments
104,862
users