Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged encryption-decryption
2
votes
1
answer
1
UGC NET CSE | June 2019 | Part 2 | Question: 86
In the TCP/IP model, encryption and decryption are functions of ____ layer. data link network transport application
In the TCP/IP model, encryption and decryption are functions of ____ layer.data linknetworktransportapplication
Arjun
7.8k
views
Arjun
asked
Jul 2, 2019
Computer Networks
ugcnetcse-june2019-paper2
encryption-decryption
+
–
0
votes
0
answers
2
UPPCL AE 2018:43
Which of the following must be done in order to ensure the integrity of your electronic communication? None of the above Hash the message without any key, digitally sign the hash, and then send it to the recipient along with the message Encrypt the ... message Hash the message with the public key of the recipient, and send the hash value of the message along with the message
Which of the following must be done in order to ensure the integrity of your electronic communication?None of the aboveHash the message without any key, digitally sign th...
admin
229
views
admin
asked
Jan 5, 2019
Computer Networks
uppcl2018
computer-networks
encryption-decryption
+
–
0
votes
0
answers
3
UPPCL AE 2018:42
What key(s) are used by the sender of an encrypted message in an asymmetric-key cipher? Private key of the sender Public or private key of the sender Neither public nor private key of the receiver Public key of the receiver
What key(s) are used by the sender of an encrypted message in an asymmetric-key cipher?Private key of the senderPublic or private key of the senderNeither public nor priv...
admin
206
views
admin
asked
Jan 5, 2019
Computer Networks
uppcl2018
computer-networks
encryption-decryption
+
–
0
votes
4
answers
4
UGC NET CSE | July 2018 | Part 2 | Question: 48
Decrypt the message "WTAAD" using the Caesar Cipher with key =15 LIPPS HELLO PLLEH DAATW
Decrypt the message "WTAAD" using the Caesar Cipher with key =15LIPPSHELLOPLLEHDAATW
Pooja Khatri
5.3k
views
Pooja Khatri
asked
Jul 13, 2018
Others
ugcnetcse-july2018-paper2
cryptography
encryption-decryption
+
–
0
votes
1
answer
5
UGC NET CSE | July 2018 | Part 2 | Question: 50
Encrypt the Message "HELLO MY DEARZ" using Transposition Cipher with $Key \begin{cases} \text{Plain Text} & 2 4 1 3 \\ \text{Cipher Text} &1 2 3 4 \end{cases}$ HLLEO YM AEDRZ EHOLL ZYM RAED ELHL MDOY AZER ELHL DOMY ZAER
Encrypt the Message "HELLO MY DEARZ" using Transposition Cipher with$Key \begin{cases} \text{Plain Text} & 2 4 1 3 \\ \text{Cipher Text} &1 2 3 4 \end{cases}$HLLEO YM AED...
Pooja Khatri
4.6k
views
Pooja Khatri
asked
Jul 13, 2018
Computer Networks
ugcnetcse-july2018-paper2
cryptography
encryption-decryption
computer-networks
+
–
1
votes
1
answer
6
UGC NET CSE | September 2013 | Part 3 | Question: 57
If user A wants to send an encrypted message to user B, the plain text of A is encrypted with the Public key of user A Public key of user B Private key of user A Private key of user B
If user A wants to send an encrypted message to user B, the plain text of A is encrypted with thePublic key of user APublic key of user BPrivate key of user APrivate key ...
go_editor
2.4k
views
go_editor
asked
Jul 24, 2016
Others
ugcnetcse-sep2013-paper3
cryptography
encryption-decryption
+
–
1
votes
1
answer
7
UGC NET CSE | September 2013 | Part 2 | Question: 3
Which of the following substitution technique have the relationship between a character in the plaintext and a character in the ciphertext as one-to-many? Monoalphabetic Polyalphabetic Transpositional None of the above
Which of the following substitution technique have the relationship between a character in the plaintext and a character in the ciphertext as one-to-many?MonoalphabeticPo...
go_editor
2.5k
views
go_editor
asked
Jul 20, 2016
Others
ugcnetsep2013ii
cryptography
encryption-decryption
+
–
To see more, click for the
full list of questions
or
popular tags
.
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register