Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged cryptography
0
votes
1
answer
31
MadeEasy Test Series: Computer Networks - Network Security
Consider the following statements with respect to digital signatures: S1: Digital signature ensures authenticity of the sender but not integrity of the message. S2: A single secret key can be used by the sender to sign multiple ... Both RSA cryptosystem and RSA digital signature scheme uses same set of keys. Which of the following is true?
Consider the following statements with respect to digital signatures:S1: Digital signature ensures authenticity of the sender but not integrity of the message.S2: A singl...
Appu B
1.8k
views
Appu B
asked
Dec 3, 2017
Computer Networks
made-easy-test-series
computer-networks
cryptography
network-security
rsa-security-networks
+
–
0
votes
1
answer
32
Doubt!
You generate a perfectly random key K. You send two messages, M1 and M2, encrypted with K (C1 = K xor M1 and C2 = K xor M2). Does sending C2 leak information about M1 and M2?
You generate a perfectly random key K. You send two messages, M1 and M2, encrypted with K (C1 = K xor M1 and C2 = K xor M2). Does sending C2 leak information about M1 and...
vijay_jr
359
views
vijay_jr
asked
Dec 2, 2017
Computer Networks
cryptography
network-security
+
–
2
votes
1
answer
33
Networking
Using RSA, choose p = 3 and q = 11, and encrypt “DOG” as one message m.
Using RSA, choose p = 3 and q = 11, and encrypt “DOG” as one message m.
reena_kandari
849
views
reena_kandari
asked
Jul 4, 2017
Computer Networks
cryptography
+
–
6
votes
3
answers
34
ISRO2017-35
$\text{MD5}$ is a widely used hash function for producing hash value of $64$ bits $128$ bits $512$ bits $1024$ bits
$\text{MD5}$ is a widely used hash function for producing hash value of$64$ bits$128$ bits$512$ bits$1024$ bits
sh!va
4.4k
views
sh!va
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
network-security
cryptography
+
–
39
votes
3
answers
35
GATE CSE 2017 Set 1 | Question: 15
A sender $S$ sends a message $m$ to receiver $R$, which is digitally signed by $S$ with its private key. In this scenario, one or more of the following security violations can take place. $S$ ... with a fraudulent message Which of the following are possible security violations? I and II only I only II only II and III only
A sender $S$ sends a message $m$ to receiver $R$, which is digitally signed by $S$ with its private key. In this scenario, one or more of the following security violation...
Arjun
12.6k
views
Arjun
asked
Feb 14, 2017
Computer Networks
gatecse-2017-set1
computer-networks
cryptography
normal
network-security
out-of-gate-syllabus
+
–
0
votes
1
answer
36
MadeEasy Subject Test: Computer Networks - Cryptography
pkb
417
views
pkb
asked
Feb 7, 2017
Computer Networks
made-easy-test-series
computer-networks
cryptography
+
–
0
votes
1
answer
37
Ace Test Series: Computer Networks - Cryptography
chaser
334
views
chaser
asked
Jan 1, 2017
Computer Networks
ace-test-series
computer-networks
cryptography
+
–
3
votes
2
answers
38
UGC NET CSE | August 2016 | Part 3 | Question: 30
The plain text message $BAHI$ encrypted with $RSA$ algorithm using $e = 3, d = 7$ and $n = 33$ and the characters of the message are encoded using the values $00$ to $25$ for letters A to Z. Suppose character by character encryption was implemented. Then, the Cipher Text message is _____. ABHI HAQC IHBA BHQC
The plain text message $BAHI$ encrypted with $RSA$ algorithm using $e = 3, d = 7$ and $n = 33$ and the characters of the message are encoded using the values $00$ to $25$...
makhdoom ghaya
4.8k
views
makhdoom ghaya
asked
Oct 1, 2016
Computer Networks
ugcnetcse-aug2016-paper3
cryptography
computer-networks
+
–
0
votes
1
answer
39
Cryptography
what is the difference between public key and private key ?
what is the difference between public key and private key ?
Karthik Akula
648
views
Karthik Akula
asked
Sep 1, 2016
Computer Networks
computer-networks
cryptography
+
–
4
votes
1
answer
40
UGC NET CSE | December 2013 | Part 3 | Question: 32
Find the false statement: In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. The symmetric cipher DES (Data Encryption Standard) was widely used in the industry for security product. The ... of size 56 bits and 124 bits. Public key algorithms use two different keys for Encryption and Decryption
Find the false statement:In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption.The symmetric cipher DES (Data Encryption Standa...
go_editor
2.1k
views
go_editor
asked
Jul 28, 2016
Computer Networks
ugcnetcse-dec2013-paper3
computer-networks
cryptography
+
–
1
votes
1
answer
41
UGC NET CSE | September 2013 | Part 3 | Question: 57
If user A wants to send an encrypted message to user B, the plain text of A is encrypted with the Public key of user A Public key of user B Private key of user A Private key of user B
If user A wants to send an encrypted message to user B, the plain text of A is encrypted with thePublic key of user APublic key of user BPrivate key of user APrivate key ...
go_editor
2.4k
views
go_editor
asked
Jul 24, 2016
Others
ugcnetcse-sep2013-paper3
cryptography
encryption-decryption
+
–
1
votes
2
answers
42
UGC NET CSE | September 2013 | Part 3 | Question: 3
Assume that each alphabet can have a value between 0 to 9 in a cryptoarithmetic problem Which of the following statements is true? No two alphabets can have the same numeric value Any two alphabets can have the same numeric value D=0 D=1 I and III I and IV II and III II and IV
Assume that each alphabet can have a value between 0 to 9 in a cryptoarithmetic problemWhich of the following statements is true?No two alphabets can have the same numeri...
go_editor
3.0k
views
go_editor
asked
Jul 22, 2016
Others
ugcnetcse-sep2013-paper3
cryptography
crypt-arithmetic
+
–
2
votes
3
answers
43
UGC NET CSE | December 2014 | Part 2 | Question: 30
How many distinct stages are there in $DES$ algorithm, which is parameterized by a $56$-bit key ? $16$ $17$ $18$ $19$
How many distinct stages are there in $DES$ algorithm, which is parameterized by a $56$-bit key ?$16$$17$$18$$19$
makhdoom ghaya
4.6k
views
makhdoom ghaya
asked
Jul 21, 2016
Computer Networks
ugcnetcse-dec2014-paper2
computer-networks
cryptography
+
–
1
votes
1
answer
44
UGC NET CSE | September 2013 | Part 2 | Question: 3
Which of the following substitution technique have the relationship between a character in the plaintext and a character in the ciphertext as one-to-many? Monoalphabetic Polyalphabetic Transpositional None of the above
Which of the following substitution technique have the relationship between a character in the plaintext and a character in the ciphertext as one-to-many?MonoalphabeticPo...
go_editor
2.5k
views
go_editor
asked
Jul 20, 2016
Others
ugcnetsep2013ii
cryptography
encryption-decryption
+
–
1
votes
1
answer
45
UGC NET CSE | June 2014 | Part 3 | Question: 56
Match the following cryptographic algorithms with their design issues : ... $\text{a-iii, b-iv, c-ii, d-i}$ $\text{a-iv, b-i, c-ii, d-iii}$
Match the following cryptographic algorithms with their design issues : $ \begin{array} {cIcI} & \textbf{List-I} & & \textbf{List-II} \\ \text{a.} & \text{DES} & \te...
makhdoom ghaya
2.3k
views
makhdoom ghaya
asked
Jul 11, 2016
Computer Networks
ugcnetjune2014iii
computer-networks
network-security
cryptography
+
–
0
votes
0
answers
46
crypotography
Exponentiation is a heavily used operation in public key cryptography. Which of the following options is the tightest upper bound on the number of multiplications required to compute b^n mod m,0<=b,n<=m? a)O(log n) b)O(sqrt(n)) c)O(n/log n) d)O(n) please explain.. bnmodm,0≤b,n≤mbnmodm,0≤b,n≤m ?
Exponentiation is a heavily used operation in public key cryptography. Which of the following options is the tightest upper bound on the number of multiplications require...
indrajeet
690
views
indrajeet
asked
Jun 24, 2016
Computer Networks
computer-networks
network-security
cryptography
+
–
0
votes
1
answer
47
Cryptography
In _______-key cryptography, everyone has access to all the public keys. A. PRivate B. Public C. Symmetric D. Certfied
In _______-key cryptography, everyone has access to all the public keys.A. PRivateB. PublicC. SymmetricD. Certfied
sh!va
1.5k
views
sh!va
asked
Jun 20, 2016
Unknown Category
cryptography
computer-networks
+
–
5
votes
2
answers
48
ISRO2009-7
Advanced Encryption Standard (AES) is based on Asymmetric key algorithm Symmetric key algorithm Public key algorithm Key exchange
Advanced Encryption Standard (AES) is based onAsymmetric key algorithmSymmetric key algorithmPublic key algorithmKey exchange
jaiganeshcse94
3.8k
views
jaiganeshcse94
asked
Jun 2, 2016
Computer Networks
isro2009
computer-networks
cryptography
network-security
+
–
3
votes
3
answers
49
ISRO-2013-46
Which of the following encryption algorithms is based on the Feistal structure? Advanced Encryption Standard RSA public key cryptographic algorithm Data Encryption standard RC4
Which of the following encryption algorithms is based on the Feistal structure?Advanced Encryption StandardRSA public key cryptographic algorithmData Encryption standardR...
makhdoom ghaya
5.1k
views
makhdoom ghaya
asked
Apr 29, 2016
Computer Networks
isro2013
cryptography
+
–
4
votes
1
answer
50
ISRO-2013-21
What will be the cipher text produced by the following cipher function for the plain text ISRO with key $k=7$. [ Consider $'A'=0, 'B'=1,....'Z'=25$] $C_{k} (M) = (kM + 13) \mod 26$ RJCH QIBG GQPM XPIN
What will be the cipher text produced by the following cipher function for the plain text ISRO with key $k=7$. [ Consider $'A'=0, 'B'=1,....'Z'=25$]$C_{k} (M) = (kM + 13)...
makhdoom ghaya
4.2k
views
makhdoom ghaya
asked
Apr 26, 2016
Computer Networks
isro2013
cryptography
+
–
27
votes
5
answers
51
GATE CSE 2016 Set 2 | Question: 23
Anarkali digitally signs a message and sends it to Salim. Verification of the signature by Salim requires. Anarkali's public key. Salim's public key. Salim's private key. Anarkali's private key.
Anarkali digitally signs a message and sends it to Salim. Verification of the signature by Salim requires.Anarkali's public key.Salim's public key.Salim's private key.Ana...
Akash Kanase
9.4k
views
Akash Kanase
asked
Feb 12, 2016
Computer Networks
gatecse-2016-set2
computer-networks
network-security
cryptography
easy
out-of-gate-syllabus
+
–
3
votes
2
answers
52
Diffie Hellman
Himanshu1
2.3k
views
Himanshu1
asked
Dec 6, 2015
Computer Networks
computer-networks
cryptography
+
–
Page:
« prev
1
2
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register