search
Log In

Recent questions tagged network-security

0 votes
1 answer
1
Using ‘RSA’ public key cryptosystem, if $p=3$, $q=11$ and $d=7$, find the value of $e$ and encrypt the number $’19’$ $20, 19$ $33,11$ $3, 28$ $77, 28$
asked Nov 20, 2020 in Computer Networks jothee 175 views
0 votes
2 answers
2
Which among the following statement(s) is(are) true? A hash function takes a message of arbitrary length and generates a fixed length code A hash function takes a message of fixed length and generates a code of variable length A hash function may give same hash value for distinct messages Choose the correct ... options given below: $(a)$ only $(b)$ and $(c)$ only $(a)$ and $(c)$ only $(b)$ only
asked Nov 20, 2020 in Computer Networks jothee 437 views
1 vote
2 answers
3
Firewall is a device that filters access to the protected network from the outside network. Firewalls can filter the packets on the basis of Source IP address Destination IP address TCP Source Port UDP Source Port TCP Destination Port Choose the correct answer from the options given below: $(a), (b)$ and $(c)$ only $(b)$ and $(e)$ only $(c)$ and $(d)$ only $(a), (b), (c), (d)$ and $(e)$ only
asked Nov 20, 2020 in Computer Networks jothee 146 views
0 votes
1 answer
4
Given below are two statements: Statement $I$: In Ceasar Cipher each letter of Plain text is replaced by another letter for encryption Statement $II$: Diffie-Hellman algorithm is used for exchange of secret key In the light of the above statements, choose the correct answer ... $I$ is correct but Statement $II$ is false Statement $I$ is incorrect but Statement $II$ is true
asked Nov 20, 2020 in Computer Networks jothee 177 views
1 vote
2 answers
5
0 votes
2 answers
6
$PGP$ encrypts data by using a block cipher called : international data encryption algorithm private data encryption algorithm internet data encryption algorithm none of the options
asked Mar 31, 2020 in Computer Networks Lakshman Patel RJIT 1.1k views
1 vote
1 answer
7
1 vote
2 answers
8
The ability to inject packets into the Internet with a false source address is known as Man-in-the-middle attack IP phishing IP sniffing IP spoofing
asked Jul 2, 2019 in Computer Networks Arjun 844 views
1 vote
1 answer
9
The RSA encryption algorithm also works in reverse, that is, you can encrypt a message with the private key and decrypt it using the public key. This property is used in instruction detection systems digital signatures data compression certification
asked Jul 2, 2019 in Computer Networks Arjun 1k views
0 votes
1 answer
10
A math class has 25 students. Assuming that all of the students were born in the first half of the year—between January 1st and June 30th— what is the probability that at least two students have the same birthday? Assume that nobody was born on leap day, so there are 181 possible birthdays.
asked Mar 19, 2019 in Computer Networks ajaysoni1924 212 views
0 votes
0 answers
11
33. Two users can establish a shared secret key using the Diffie-Hellman algorithm, even if they have never met, share no secrets, and have no certificates (a) Explain how this algorithm is susceptible to a man-in-the-middle attack. (b) How would this susceptibility change if n or g were secret?
asked Mar 19, 2019 in Computer Networks ajaysoni1924 170 views
0 votes
1 answer
12
The Diffie-Hellman key exchange is being used to establish a secret key between Alice and Bob. Alice sends Bob (227, 5, 82). Bob responds with (125). Alice’s secret number, x, is 12, and Bob’s secret number, y, is 3. Show how Alice and Bob compute the secret key.
asked Mar 19, 2019 in Computer Networks ajaysoni1924 578 views
0 votes
0 answers
13
Alice wants to communicate with Bob, using public-key cryptography. She establishes a connection to someone she hopes is Bob. She asks him for his public key and he sends it to her in plaintext along with an X.509 certificate signed by the root CA. Alice already has the public key ... is talking to Bob? Assume that Bob does not care who he is talking to (e.g., Bob is some kind of public service).
asked Mar 19, 2019 in Computer Networks ajaysoni1924 195 views
0 votes
1 answer
14
Alice and Bob use RSA public key encryption in order to communicate between them. Trudy finds out that Alice and Bob shared one of the primes used to determine the number n of their public key pairs. In other words, Trudy found out that na = pa × q and nb = pb × q. How can Trudy use this information to break Alice’s code?
asked Mar 19, 2019 in Computer Networks ajaysoni1924 359 views
1 vote
2 answers
15
Using the RSA public key cryptosystem, with a = 1, b = 2 . . . y = 25, z = 26. (a) If p = 5 and q = 13, list five legal values for d. (b) If p = 5, q = 31, and d = 37, find e. (c) Using p = 3, q = 11, and d = 9, find e and encrypt ‘‘hello’’.
asked Mar 19, 2019 in Computer Networks ajaysoni1924 531 views
0 votes
0 answers
16
I'm not able to distinguish the difference between digital certificate and digital signature Correct me if there is flaw in my understanding : A Digital Certificate is certificate of authenticity and it is given to any host by a trusted third party which leases it ... on the other hand is dished out by the client/server whenever it attempts to make any data transfer and it ensure data integrity
asked Mar 11, 2019 in Computer Networks s_dr_13 97 views
13 votes
6 answers
17
In an RSA cryptosystem, the value of the public modulus parameter $n$ is $3007$. If it is also known as that $\phi(n)=2880$ where $\phi()$ denotes Euler’s Totient Function, then the prime factor of $n$ which is greater than $50$ is _________
asked Feb 7, 2019 in Computer Networks Arjun 5.5k views
0 votes
2 answers
19
Suppose that everyone in a group of $N$ people wants to communicate secretly with $(N-1)$ other people using symmetric key cryptographic system. The communication between any two persons should not be decodable by the others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is $N(N-1)$ $N(N-1)/2$ $2N$ $(N-1)^2$
asked Jan 2, 2019 in Unknown Category Arjun 268 views
0 votes
0 answers
20
It is impossible to produce a document that differs from the original document with single bit change and valid signature I am unable to understand, why is it impossible? bit changing is one way of intruder to steal information.right? plz give some valid reason
asked Dec 31, 2018 in Computer Networks srestha 105 views
3 votes
1 answer
21
Which of the following is TRUE with respect to Diffie-Hellman Key exchange algorithm? It can be used for encryption or decryption purpose It doesn't suffer from man in the middle attack It suffers from bucket brigade attack It is an example of private key cryptography algorithm
asked Dec 27, 2018 in Computer Networks Ruturaj Mohanty 1k views
0 votes
0 answers
22
From a large set of prime numbers Jimmy choose 23 and 17 as P and Q respectively and a random integer to be 13. Jimmy wants to sends a plain text to M = 127. What will be the value of cipher text using RSA? since i am getting ciphertext =(127^13) mod 391 now how should i calculate
asked Dec 17, 2018 in Computer Networks vijju532 184 views
0 votes
2 answers
23
Let M be a confidential email that Alice wants to send to Bob, $K_B$ be Bob's encryption public key, and $K_A^{-1}$ be Alice's private key for signing. Which of the following options would be the best choice for protecting confidential emails? ... Encrypted message, Alice should sign the encrypted message and then should send this signature along with the encrypted message to BOB. Please help.
asked Nov 27, 2018 in Computer Networks Ayush Upadhyaya 650 views
0 votes
0 answers
24
Consider RSA with p = 31 and q = 47. I. n = 1457 II. z= 1200 III. 7 is acceptable choice for e Which of the following is true ? A. Only I B. Only I and II C. Only I and III D. All of I,II and II I am Getting answer (C), but answer is given (D). As per kurose Ross, Z is defined to be $(p-1)(q-1)$
asked Nov 27, 2018 in Computer Networks Ayush Upadhyaya 314 views
0 votes
1 answer
26
suppose that a message has been encrypted using DES in chipertext block chaining mode. One bit of chipertext in block Ci is accedntally transformed from 0to 1during transmissin. How much plaintext will be grabled as a result? a)1 b)2 c)n- d)n-i+1
asked Oct 28, 2018 in Computer Networks balaganesh 222 views
0 votes
1 answer
27
Using RSA key crypto system with a = 1, b = 2 etc; value for encryption if prime value are p = 7 and q = 11, the legal value for secret key is . a)69 b)49 c)49 d)119
asked Oct 12, 2018 in Computer Networks Shivangi Parashar 2 688 views
0 votes
1 answer
28
3 votes
2 answers
29
Which of following risk may arise when same key is used to encrypt direction of communication channel,that are not present if we use different key in both directions ? A. Reflection attack B. Denial of Service C. Eavesdropping D. None
asked Sep 15, 2018 in Computer Networks Na462 408 views
1 vote
4 answers
30
DH key exchange algorithm is used to establish a session between sender and receiver with n=23 and g=5. The sender's secret key is 6 and the receiver's secret key is 15. What is the secret key between the receiver and sender? Please explain with solution P.S: Answer is given as 2
asked Aug 18, 2018 in Computer Networks Kalpataru Bose 281 views
...