Recent questions tagged cryptography

0 votes
1 answer
32
You generate a perfectly random key K. You send two messages, M1 and M2, encrypted with K (C1 = K xor M1 and C2 = K xor M2). Does sending C2 leak information about M1 and...
2 votes
1 answer
33
Using RSA, choose p = 3 and q = 11, and encrypt “DOG” as one message m.
6 votes
3 answers
34
$\text{MD5}$ is a widely used hash function for producing hash value of$64$ bits$128$ bits$512$ bits$1024$ bits
0 votes
1 answer
39
what is the difference between public key and private key ?
1 votes
1 answer
41
If user A wants to send an encrypted message to user B, the plain text of A is encrypted with thePublic key of user APublic key of user BPrivate key of user APrivate key ...
2 votes
3 answers
43
1 votes
1 answer
44
1 votes
1 answer
45
Match the following cryptographic algorithms with their design issues : $ \begin{array} {cIcI} & \textbf{List-I} & & \textbf{List-II} \\ \text{a.} & \text{DES} & \te...
0 votes
1 answer
47
In _______-key cryptography, everyone has access to all the public keys.A. PRivateB. PublicC. SymmetricD. Certfied
5 votes
2 answers
48
Advanced Encryption Standard (AES) is based onAsymmetric key algorithmSymmetric key algorithmPublic key algorithmKey exchange
3 votes
3 answers
49
Which of the following encryption algorithms is based on the Feistal structure?Advanced Encryption StandardRSA public key cryptographic algorithmData Encryption standardR...
4 votes
1 answer
50
What will be the cipher text produced by the following cipher function for the plain text ISRO with key $k=7$. [ Consider $'A'=0, 'B'=1,....'Z'=25$]$C_{k} (M) = (kM + 13)...
27 votes
5 answers
51
3 votes
2 answers
52