Login
Register
@
Dark Mode
Profile
Edit my Profile
Messages
My favorites
Register
Activity
Q&A
Questions
Unanswered
Tags
Subjects
Users
Ask
Previous Years
Blogs
New Blog
Exams
Dark Mode
Recent questions tagged cryptography
1
vote
1
answer
1
DRDO CSE 2022 Paper 2 | Question: 25
Assume when encrypting $3$-bit plaintext with a block cipher with key $\text{K},$ ... with key $\mathrm{K}$ in counter mode (with initial counter value $=0):$ $\text{C}=100110000$ What was the plaintext?
admin
asked
in
Computer Networks
Dec 15, 2022
by
admin
87
views
drdocse-2022-paper2
computer-networks
cryptography
7-marks
descriptive
1
vote
0
answers
2
DRDO CSE 2022 Paper 2 | Question: 26
Suppose $\mathrm{A}$ and $\mathrm{B}$ use Diffie-Hellnian key exchange. Let the commonly agreed (i.e., global public) prime number $(q)=13$ and the primitive root $(\alpha)=6$. If $\text{A}$ chose the private value $\left(X_{A}\right)=5$ ... value $\left(X_{B}\right)=4$. Find the shared secret key $(\mathrm{K})$ between $\mathrm{A}$ and $\mathrm{B}$
admin
asked
in
Computer Networks
Dec 15, 2022
by
admin
63
views
drdocse-2022-paper2
computer-networks
cryptography
5-marks
descriptive
1
vote
1
answer
3
DRDO CSE 2022 Paper 2 | Question: 27
A transposition cipher (but not a rail-fence cipher) was used to produce the following ciphertext: $\text{X 2! H M E S S S E 2 Y T A 2 I I A}$ The key used was: $5 \; 2 \; 6 \; 3 \; 4 \; 1.$ What was the plaintext used (in English)?
admin
asked
in
Computer Networks
Dec 15, 2022
by
admin
51
views
drdocse-2022-paper2
computer-networks
cryptography
7-marks
descriptive
0
votes
0
answers
4
Introduction to Modern Cryptography
Let $\varepsilon>0$ be a constant. Say an encryption scheme is $\varepsilon$-perfectly secret if for every adversary $\mathcal{A}$ ... scheme that is $\varepsilon$-perfectly secret must have $|\mathcal{K}| \geq(1-2 \varepsilon) \cdot|\mathcal{M}| $
person
asked
in
Computer Networks
Oct 16, 2021
by
person
151
views
cryptography
0
votes
1
answer
5
UGC NET CSE | October 2020 | Part 2 | Question: 32
Using ‘RSA’ public key cryptosystem, if $p=3$, $q=11$ and $d=7$, find the value of $e$ and encrypt the number $’19’$ $20, 19$ $33,11$ $3, 28$ $77, 28$
go_editor
asked
in
Computer Networks
Nov 20, 2020
by
go_editor
1.1k
views
ugcnetcse-oct2020-paper2
computer-networks
network-security
cryptography
0
votes
2
answers
6
UGC NET CSE | October 2020 | Part 2 | Question: 54
Which among the following statement(s) is(are) true? A hash function takes a message of arbitrary length and generates a fixed length code A hash function takes a message of fixed length and generates a code of variable length A hash function may give same hash value for ... below: $(a)$ only $(b)$ and $(c)$ only $(a)$ and $(c)$ only $(b)$ only
go_editor
asked
in
Computer Networks
Nov 20, 2020
by
go_editor
1.8k
views
ugcnetcse-oct2020-paper2
computer-networks
network-security
cryptography
2
votes
6
answers
7
UGC NET CSE | January 2017 | Part 2 | Question: 24
If $h$ is chosen from a universal collection of hash functions and is used to hash $n$ keys into a table of size $m$, where $n \leq m$, the expected number of collisions involving a particular key $x$ is less than __________. $1$ $1/n$ $1/m$ $n/m$
go_editor
asked
in
DS
Mar 24, 2020
by
go_editor
1.4k
views
ugcnetjan2017ii
cryptography
hashing
data-structures
2
votes
2
answers
8
ISRO2020-45
Avalanche effect in cryptography refers Large changes in cipher text when the keyword is changed minimally Large changes in cipher text when the plain text is changed Large Impact of keyword change to length of the cipher text None of the above
Satbir
asked
in
Computer Networks
Jan 13, 2020
by
Satbir
1.5k
views
isro-2020
computer-networks
cryptography
normal
1
vote
2
answers
9
ISRO2020-44
In a columnar transportation cipher, the plain text is the tomato is a plant in the night shade family , keyword is $\text{TOMATO}$ . The cipher text is $\text{ TINESAX / EOAHTFX / HTLTHEY / MAIIAIX / TAPNGDL / OSTNHMX }$ ... $\text{ EOAHTFX / TINESAX / HTLTHEY / MAIIAIX / TAPNGDL / OSTNHMX }$
Satbir
asked
in
Computer Networks
Jan 13, 2020
by
Satbir
2.3k
views
isro-2020
computer-networks
cryptography
normal
0
votes
1
answer
10
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 22 (Page No. 873)
A math class has 25 students. Assuming that all of the students were born in the first half of the year—between January 1st and June 30th— what is the probability that at least two students have the same birthday? Assume that nobody was born on leap day, so there are 181 possible birthdays.
ajaysoni1924
asked
in
Computer Networks
Mar 19, 2019
by
ajaysoni1924
479
views
computer-networks
tanenbaum
network-security
cryptography
0
votes
0
answers
11
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 33 (Page No. 874)
33. Two users can establish a shared secret key using the Diffie-Hellman algorithm, even if they have never met, share no secrets, and have no certificates (a) Explain how this algorithm is susceptible to a man-in-the-middle attack. (b) How would this susceptibility change if n or g were secret?
ajaysoni1924
asked
in
Computer Networks
Mar 19, 2019
by
ajaysoni1924
336
views
computer-networks
tanenbaum
network-security
cryptography
descriptive
0
votes
1
answer
12
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 32 (Page No. 874)
The Diffie-Hellman key exchange is being used to establish a secret key between Alice and Bob. Alice sends Bob (227, 5, 82). Bob responds with (125). Alice’s secret number, x, is 12, and Bob’s secret number, y, is 3. Show how Alice and Bob compute the secret key.
ajaysoni1924
asked
in
Computer Networks
Mar 19, 2019
by
ajaysoni1924
1.2k
views
computer-networks
tanenbaum
network-security
cryptography
0
votes
0
answers
13
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 25 (Page No. 873)
Alice wants to communicate with Bob, using public-key cryptography. She establishes a connection to someone she hopes is Bob. She asks him for his public key and he sends it to her in plaintext along with an X.509 certificate signed ... that Bob does not care who he is talking to (e.g., Bob is some kind of public service).
ajaysoni1924
asked
in
Computer Networks
Mar 19, 2019
by
ajaysoni1924
373
views
computer-networks
network-security
tanenbaum
cryptography
0
votes
1
answer
14
crypt arithmetic
If 356 + 123 = 512 .Then what is the value of 653 + 321? 1.215 2.974 3.1004 4.1304 How to solve these type questions?
screddy1313
asked
in
Quantitative Aptitude
Jan 27, 2019
by
screddy1313
718
views
numerical
cryptography
0
votes
1
answer
15
DH algorithm
How to calculate such a value: Please, someone explain because this is not possible on cal….!
Nandkishor3939
asked
in
Computer Networks
Jan 26, 2019
by
Nandkishor3939
300
views
computer-networks
cryptography
0
votes
0
answers
16
UPPCL AE 2018:49
If you are running a website, you purchase a digital certificate from a certification authority, and send your digital certificate to any web-client connecting to your website in order to: Provide your password to access your website Provide ... your website Announce that you actually guarantee security of the website Provide your private key to users connecting to your website
Lakshman Patel RJIT
asked
in
Computer Networks
Jan 5, 2019
by
Lakshman Patel RJIT
123
views
uppcl2018
computer-networks
cryptography
0
votes
0
answers
17
UPPCL AE 2018:48
Which of the following always happens during the $\text{SSL/TLS}$ handshake? The server and client already use a fixed set of cryptographic algorithms that are pre-decided by the system administrators The client sends client hello with a set of ... distribution and fixing of algorithms are done offline so there is no need for any exchange of algorithm or key during the handshake
Lakshman Patel RJIT
asked
in
Computer Networks
Jan 5, 2019
by
Lakshman Patel RJIT
129
views
uppcl2018
computer-networks
cryptography
1
vote
1
answer
18
Calculate mod in RSA algorithm
How to calculate Mod of a big number in RSA Like 5 raise to power 13 mod 77
Fida
asked
in
Computer Networks
Dec 10, 2018
by
Fida
1.3k
views
cryptography
computer-networks
0
votes
0
answers
19
Short cut to calculate d (private key) ins RSA algorithm
Please tell me shortcut to calculate d (private key) in RSA Algorithm
Fida
asked
in
Computer Networks
Nov 13, 2018
by
Fida
1.6k
views
rsa
algorithms
cryptography
0
votes
1
answer
20
Cryptography
Using RSA key crypto system with a = 1, b = 2 etc; value for encryption if prime value are p = 7 and q = 11, the legal value for secret key is . a)69 b)49 c)49 d)119
Shivangi Parashar 2
asked
in
Computer Networks
Oct 12, 2018
by
Shivangi Parashar 2
1.0k
views
cryptography
network-security
computer-networks
1
vote
1
answer
21
Diffie Hellman
Na462
asked
in
Computer Networks
Sep 15, 2018
by
Na462
730
views
computer-networks
cryptography
0
votes
0
answers
22
Cryptography Topics in Syllabus
Are the following topics there in Syllabus? Digital Signatures Elgamal Digital Signature Scheme Schnorr Digital Signature Scheme Message Authentication Codes Data Encryption Standard (DES) Advanced Encryption Standard (AES) Triple DES Elliptic Curve Cryptography Secure Hash Algorithm (SHA) Message Authentication Codes(MAC)
Balaji Jegan
asked
in
Computer Networks
Aug 5, 2018
by
Balaji Jegan
471
views
cryptography
2
votes
2
answers
23
MadeEasy Full Length Test 2019: Computer Networks - Rsa Security Networks
In an RSA system, the public key of given user is e = 31 and n = 3599. The private key of user will be ________
piya
asked
in
Computer Networks
Jul 23, 2018
by
piya
9.2k
views
computer-networks
rsa-security-networks
cryptography
made-easy-test-series
0
votes
1
answer
24
UGC NET CSE | July 2018 | Part 2 | Question: 45
Match the following symmetric block ciphers with corresponding block and key sizes: ... $\text{a-ii; b-iv; c-iii; d-i}$ $\text{a-iv; b-ii; c-iii; d-i}$
Pooja Khatri
asked
in
Computer Networks
Jul 13, 2018
by
Pooja Khatri
1.3k
views
ugcnetcse-july2018-paper2
cryptography
computer-networks
0
votes
4
answers
25
UGC NET CSE | July 2018 | Part 2 | Question: 48
Decrypt the message "WTAAD" using the Caesar Cipher with key =15 LIPPS HELLO PLLEH DAATW
Pooja Khatri
asked
in
Others
Jul 13, 2018
by
Pooja Khatri
4.5k
views
ugcnetcse-july2018-paper2
cryptography
encryption-decryption
0
votes
1
answer
26
UGC NET CSE | July 2018 | Part 2 | Question: 50
Encrypt the Message "HELLO MY DEARZ" using Transposition Cipher with $Key \begin{cases} \text{Plain Text} & 2 4 1 3 \\ \text{Cipher Text} &1 2 3 4 \end{cases}$ HLLEO YM AEDRZ EHOLL ZYM RAED ELHL MDOY AZER ELHL DOMY ZAER
Pooja Khatri
asked
in
Computer Networks
Jul 13, 2018
by
Pooja Khatri
3.9k
views
ugcnetcse-july2018-paper2
cryptography
encryption-decryption
computer-networks
0
votes
0
answers
27
group theory and cryptography
How is group theory and cryptography linked?
Sri
asked
in
Others
May 2, 2018
by
Sri
302
views
group-theory
cryptography
1
vote
4
answers
28
ISRO2018-78
Which one of the following algorithm is not used in asymmetric key cryptography? RSA Algorithm Gillie-Hellman Algorithm Electronic Code Book Algorithm None of the above
Arjun
asked
in
Computer Networks
Apr 22, 2018
by
Arjun
13.0k
views
isro2018
computer-networks
network-security
cryptography
2
votes
0
answers
29
Cryptography - RSA Algorithm
In RSA Algorithm, we have public key(e,n) and private key(d,n). Sender side we encrypt plain text P as an integer between 0 and n-1 as follows: $P^{e}modn$ ... message P we are taking it as as integer between 0 and n-1. So, the P may not be coprime to n. Then how does the algorithm work?
Ashish Sharma 3
asked
in
Computer Networks
Jan 12, 2018
by
Ashish Sharma 3
859
views
network-security
computer-networks
rsa-security-networks
cryptography
0
votes
1
answer
30
MadeEasy Test Series: Computer Networks - Network Security
Consider the following statements with respect to digital signatures: S1: Digital signature ensures authenticity of the sender but not integrity of the message. S2: A single secret key can be used by the sender to sign multiple ... Both RSA cryptosystem and RSA digital signature scheme uses same set of keys. Which of the following is true?
Appu B
asked
in
Computer Networks
Dec 3, 2017
by
Appu B
1.5k
views
made-easy-test-series
computer-networks
cryptography
network-security
rsa-security-networks
Page:
1
2
next »
Subscribe to GATE CSE 2023 Test Series
Subscribe to GO Classes for GATE CSE 2023
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
-tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
Central Pollution Control Board CPCB Various Post Recruitment 2023
MP Rajya Sahkari Apex Bank Various Post Recruitment 2023
NITIE MUMBAI throgh GATE
PGCIL recruitment 2023 – Apply Online For 138 Posts through GATE
Admission guidance for GATE CSE 2023
Subjects
All categories
General Aptitude
(2.6k)
Engineering Mathematics
(9.4k)
Digital Logic
(3.3k)
Programming and DS
(5.9k)
Algorithms
(4.6k)
Theory of Computation
(6.7k)
Compiler Design
(2.3k)
Operating System
(5.0k)
Databases
(4.6k)
CO and Architecture
(3.8k)
Computer Networks
(4.7k)
Non GATE
(1.3k)
Others
(2.5k)
Admissions
(655)
Exam Queries
(848)
Tier 1 Placement Questions
(17)
Job Queries
(77)
Projects
(9)
Unknown Category
(866)
Recent questions tagged cryptography
Recent Blog Comments
Please upload updated previous year question...
The last hardcopy that was made was for GATE 2022...
overall only 3 post .no post for gen male
for gen GS in the range of 720-750 approx.
can we get 2023 hark copy from amazon?