# Recent questions tagged network-security 1 vote
1
The ability to inject packets into the Internet with a false source address is known as Man-in-the-middle attack IP phishing IP sniffing IP spoofing
1 vote
2
The RSA encryption algorithm also works in reverse, that is, you can encrypt a message with the private key and decrypt it using the public key. This property is used in instruction detection systems digital signatures data compression certification
3
A math class has 25 students. Assuming that all of the students were born in the first half of the year—between January 1st and June 30th— what is the probability that at least two students have the same birthday? Assume that nobody was born on leap day, so there are 181 possible birthdays.
4
33. Two users can establish a shared secret key using the Diffie-Hellman algorithm, even if they have never met, share no secrets, and have no certificates (a) Explain how this algorithm is susceptible to a man-in-the-middle attack. (b) How would this susceptibility change if n or g were secret?
5
The Diffie-Hellman key exchange is being used to establish a secret key between Alice and Bob. Alice sends Bob (227, 5, 82). Bob responds with (125). Alice’s secret number, x, is 12, and Bob’s secret number, y, is 3. Show how Alice and Bob compute the secret key.
6
Alice wants to communicate with Bob, using public-key cryptography. She establishes a connection to someone she hopes is Bob. She asks him for his public key and he sends it to her in plaintext along with an X.509 certificate signed by the root CA. Alice already has the public key ... is talking to Bob? Assume that Bob does not care who he is talking to (e.g., Bob is some kind of public service).
7
Alice and Bob use RSA public key encryption in order to communicate between them. Trudy finds out that Alice and Bob shared one of the primes used to determine the number n of their public key pairs. In other words, Trudy found out that na = pa × q and nb = pb × q. How can Trudy use this information to break Alice’s code?
1 vote
8
Using the RSA public key cryptosystem, with a = 1, b = 2 . . . y = 25, z = 26. (a) If p = 5 and q = 13, list five legal values for d. (b) If p = 5, q = 31, and d = 37, find e. (c) Using p = 3, q = 11, and d = 9, find e and encrypt ‘‘hello’’.
9
I'm not able to distinguish the difference between digital certificate and digital signature Correct me if there is flaw in my understanding : A Digital Certificate is certificate of authenticity and it is given to any host by a trusted third party which leases it ... on the other hand is dished out by the client/server whenever it attempts to make any data transfer and it ensure data integrity
10
In an RSA cryptosystem, the value of the public modulus parameter $n$ is $3007$. If it is also known as that $\phi(n)=2880$ where $\phi()$ denotes Euler’s Totient Function, then the prime factor of $n$ which is greater than $50$ is _________
11
12
It is impossible to produce a document that differs from the original document with single bit change and valid signature I am unable to understand, why is it impossible? bit changing is one way of intruder to steal information.right? plz give some valid reason
13
Which of the following is TRUE with respect to Diffie-Hellman Key exchange algorithm? It can be used for encryption or decryption purpose It doesn't suffer from man in the middle attack It suffers from bucket brigade attack It is an example of private key cryptography algorithm
14
From a large set of prime numbers Jimmy choose 23 and 17 as P and Q respectively and a random integer to be 13. Jimmy wants to sends a plain text to M = 127. What will be the value of cipher text using RSA? since i am getting ciphertext =(127^13) mod 391 now how should i calculate
15
Let M be a confidential email that Alice wants to send to Bob, $K_B$ be Bob's encryption public key, and $K_A^{-1}$ be Alice's private key for signing. Which of the following options would be the best choice for protecting confidential emails? ... Encrypted message, Alice should sign the encrypted message and then should send this signature along with the encrypted message to BOB. Please help.
16
Consider RSA with p = 31 and q = 47. I. n = 1457 II. z= 1200 III. 7 is acceptable choice for e Which of the following is true ? A. Only I B. Only I and II C. Only I and III D. All of I,II and II I am Getting answer (C), but answer is given (D). As per kurose Ross, Z is defined to be $(p-1)(q-1)$
17
18
suppose that a message has been encrypted using DES in chipertext block chaining mode. One bit of chipertext in block Ci is accedntally transformed from 0to 1during transmissin. How much plaintext will be grabled as a result? a)1 b)2 c)n- d)n-i+1
19
Using RSA key crypto system with a = 1, b = 2 etc; value for encryption if prime value are p = 7 and q = 11, the legal value for secret key is . a)69 b)49 c)49 d)119
20
21
Which of following risk may arise when same key is used to encrypt direction of communication channel,that are not present if we use different key in both directions ? A. Reflection attack B. Denial of Service C. Eavesdropping D. None
1 vote
22
DH key exchange algorithm is used to establish a session between sender and receiver with n=23 and g=5. The sender's secret key is 6 and the receiver's secret key is 15. What is the secret key between the receiver and sender? Please explain with solution P.S: Answer is given as 2
23
Ques. Which of the following is incorrect? A. In circuit switched network, switches require connection establishment and teardown phases, where as in packet switched network doesn't. B. Unlike packet switching, circuit switched networks do not need any ... a destination address. D. Under some circumstance, a circuit switched network may prevent some sender from starting new conversation.
24
Consider the following services in network security: 1. Authentication of message 2. Integrity 3. Privacy 4. Non repudiation Which of the security services is/are not provided by digital signature?
25
In cryptography, the following uses transposition ciphers and the keyword is LAYER. Encrypt the following message. (Spaces are omitted during encrypton) WELCOME TO NETWORK SECURITY! WMEKREETSILTWETCOOCYONRU! EETSICOOCYWMEKRONRU!LTWET LTWETONRU!WMEKRCOOCYEETSI ONRU!COOCYLTWETEETSIWMEKR
26
Avalanche effect in cryptography Is desirable property of cryptographic algorithm Is undesirable property of cryptographic algorithm Has no effect on encryption algorithm None of the above
1 vote
27
What is one advantage of setting up a $DMZ$ (Demilitarized Zone) with two firewalls? You can control where traffic goes in the three networks You can do statefull packet filtering You can do load balancing Improve network performance
1 vote
$\textbf{VPN}$ Works at which layer? Application layer Transport layer Network layer Data-link layer