The Gateway to Computer Science Excellence
For all GATE CSE Questions
Toggle navigation
GATE Overflow
Facebook Login
or
Email or Username
Password
Remember
Login
Register

I forgot my password
Activity
Questions
Unanswered
Tags
Subjects
Users
Ask
Prev
Blogs
New Blog
Exams
First time here? Checkout the
FAQ
!
x
×
Close
Use the google search bar on side panel. It searches through all previous GATE/other questions. For hardcopy of previous year questions please see
here
Recent questions tagged networksecurity
0
votes
0
answers
1
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 22 (Page No. 873)
A math class has 25 students. Assuming that all of the students were born in the first half of the year—between January 1st and June 30th— what is the probability that at least two students have the same birthday? Assume that nobody was born on leap day, so there are 181 possible birthdays.
asked
Mar 19
in
Computer Networks
by
ajaysoni1924
Loyal
(
9.5k
points)

17
views
computernetworks
networksecurity
cryptography
0
votes
0
answers
2
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 33 (Page No. 874)
33. Two users can establish a shared secret key using the DiffieHellman algorithm, even if they have never met, share no secrets, and have no certificates (a) Explain how this algorithm is susceptible to a maninthemiddle attack. (b) How would this susceptibility change if n or g were secret?
asked
Mar 19
in
Computer Networks
by
ajaysoni1924
Loyal
(
9.5k
points)

7
views
computernetworks
networksecurity
cryptography
descriptive
0
votes
0
answers
3
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 32 (Page No. 874)
The DiffieHellman key exchange is being used to establish a secret key between Alice and Bob. Alice sends Bob (227, 5, 82). Bob responds with (125). Alice’s secret number, x, is 12, and Bob’s secret number, y, is 3. Show how Alice and Bob compute the secret key.
asked
Mar 19
in
Computer Networks
by
ajaysoni1924
Loyal
(
9.5k
points)

9
views
computernetworks
networksecurity
cryptography
0
votes
0
answers
4
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 25 (Page No. 873)
Alice wants to communicate with Bob, using publickey cryptography. She establishes a connection to someone she hopes is Bob. She asks him for his public key and he sends it to her in plaintext along with an X.509 certificate signed ... that Bob does not care who he is talking to (e.g., Bob is some kind of public service).
asked
Mar 19
in
Computer Networks
by
ajaysoni1924
Loyal
(
9.5k
points)

11
views
computernetworks
networksecurity
tanenbaum
cryptography
0
votes
0
answers
5
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 18 (Page No. 873)
Alice and Bob use RSA public key encryption in order to communicate between them. Trudy finds out that Alice and Bob shared one of the primes used to determine the number n of their public key pairs. In other words, Trudy found out that na = pa × q and nb = pb × q. How can Trudy use this information to break Alice’s code?
asked
Mar 19
in
Computer Networks
by
ajaysoni1924
Loyal
(
9.5k
points)

7
views
computernetworks
networksecurity
rsasecuritynetworks
tanenbaum
+1
vote
1
answer
6
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 17 (Page No. 873)
Using the RSA public key cryptosystem, with a = 1, b = 2 . . . y = 25, z = 26. (a) If p = 5 and q = 13, list five legal values for d. (b) If p = 5, q = 31, and d = 37, find e. (c) Using p = 3, q = 11, and d = 9, find e and encrypt ‘‘hello’’.
asked
Mar 19
in
Computer Networks
by
ajaysoni1924
Loyal
(
9.5k
points)

15
views
computernetworks
networksecurity
rsasecuritynetworks
0
votes
0
answers
7
DIGITAL CERTIFICATE ( Self Doubts)
I'm not able to distinguish the difference between digital certificate and digital signature Correct me if there is flaw in my understanding : A Digital Certificate is certificate of authenticity and it is given to any host by a trusted third ... hand is dished out by the client/server whenever it attempts to make any data transfer and it ensure data integrity
asked
Mar 11
in
Computer Networks
by
s_dr_13
(
133
points)

17
views
networksecurity
+3
votes
3
answers
8
GATE201954
In an RSA cryptosystem, the value of the public modulus parameter $n$ is $3007$. If it is also known as that $\phi(n)=2880$ where $\phi()$ denotes Euler’s Totient Function, then the primary factor of $n$ which is greater than $50$ is _________
asked
Feb 7
in
Computer Networks
by
Arjun
Veteran
(
395k
points)

1.9k
views
gate2019
numericalanswers
computernetworks
networksecurity
0
votes
1
answer
9
Ace Test Series: Computer Networks  IP Inverse
asked
Jan 19
in
Computer Networks
by
Shubhanshu
Boss
(
19.2k
points)

93
views
acetestseries
computernetworks
networksecurity
0
votes
0
answers
10
Security
It is impossible to produce a document that differs from the original document with single bit change and valid signature I am unable to understand, why is it impossible? bit changing is one way of intruder to steal information.right? plz give some valid reason
asked
Dec 31, 2018
in
Computer Networks
by
srestha
Veteran
(
110k
points)

32
views
networksecurity
computernetworks
0
votes
0
answers
11
gfg quiz
From a large set of prime numbers Jimmy choose 23 and 17 as P and Q respectively and a random integer to be 13. Jimmy wants to sends a plain text to M = 127. What will be the value of cipher text using RSA? since i am getting ciphertext =(127^13) mod 391 now how should i calculate
asked
Dec 17, 2018
in
Computer Networks
by
vijju532
Active
(
1.1k
points)

62
views
computernetworks
networksecurity
rsasecuritynetworks
0
votes
2
answers
12
GATEBOOK_CN_20
Let M be a confidential email that Alice wants to send to Bob, $K_B$ be Bob's encryption public key, and $K_A^{1}$ be Alice's private key for signing. Which of the following options would be the best choice for protecting confidential ... message, Alice should sign the encrypted message and then should send this signature along with the encrypted message to BOB. Please help.
asked
Nov 27, 2018
in
Computer Networks
by
Ayush Upadhyaya
Boss
(
25.3k
points)

136
views
networksecurity
computernetworks
0
votes
0
answers
13
GATEBOOK_CN4_19
Consider RSA with p = 31 and q = 47. I. n = 1457 II. z= 1200 III. 7 is acceptable choice for e Which of the following is true ? A. Only I B. Only I and II C. Only I and III D. All of I,II and II I am Getting answer (C), but answer is given (D). As per kurose Ross, Z is defined to be $(p1)(q1)$
asked
Nov 27, 2018
in
Computer Networks
by
Ayush Upadhyaya
Boss
(
25.3k
points)

73
views
computernetworks
networksecurity
0
votes
1
answer
14
Ace Test Series: Computer Networks  RSA Algorithm
asked
Nov 1, 2018
in
Computer Networks
by
Shankar Kakde
(
373
points)

71
views
computer
networksecurity
rsasecuritynetworks
acetestseries
0
votes
1
answer
15
network security
suppose that a message has been encrypted using DES in chipertext block chaining mode. One bit of chipertext in block Ci is accedntally transformed from 0to 1during transmissin. How much plaintext will be grabled as a result? a)1 b)2 c)n d)ni+1
asked
Oct 28, 2018
in
Computer Networks
by
balaganesh
(
145
points)

39
views
networksecurity
0
votes
1
answer
16
Cryptography
Using RSA key crypto system with a = 1, b = 2 etc; value for encryption if prime value are p = 7 and q = 11, the legal value for secret key is . a)69 b)49 c)49 d)119
asked
Oct 12, 2018
in
Computer Networks
by
Shivangi Parashar 2
(
367
points)

157
views
cryptography
networksecurity
computernetworks
0
votes
1
answer
17
DES Algorithm
asked
Sep 20, 2018
in
Computer Networks
by
Na462
Loyal
(
8.7k
points)

170
views
computernetworks
networksecurity
+3
votes
1
answer
18
Network Security
Which of following risk may arise when same key is used to encrypt direction of communication channel,that are not present if we use different key in both directions ? A. Reflection attack B. Denial of Service C. Eavesdropping D. None
asked
Sep 15, 2018
in
Computer Networks
by
Na462
Loyal
(
8.7k
points)

93
views
computernetworks
networksecurity
0
votes
3
answers
19
MadeEasy Test Series: Computer Networks  Network Security
DH key exchange algorithm is used to establish a session between sender and receiver with n=23 and g=5. The sender's secret key is 6 and the receiver's secret key is 15. What is the secret key between the receiver and sender? Please explain with solution P.S: Answer is given as 2
asked
Aug 18, 2018
in
Computer Networks
by
Kalpataru Bose
Junior
(
507
points)

78
views
madeeasytestseries
networksecurity
computernetworks
0
votes
0
answers
20
MadeEasy Test Series: Computer Networks  Network Switching
Ques. Which of the following is incorrect? A. In circuit switched network, switches require connection establishment and teardown phases, where as in packet switched network doesn't. B. Unlike packet switching, circuit ... . D. Under some circumstance, a circuit switched network may prevent some sender from starting new conversation.
asked
Jul 15, 2018
in
Computer Networks
by
Brij gopal Dixit 1
(
95
points)

32
views
madeeasytestseries
computernetworks
networksecurity
0
votes
2
answers
21
MadeEasy Test Series 2018: Computer Networks  Network Security
Consider the following services in network security: 1. Authentication of message 2. Integrity 3. Privacy 4. Non repudiation Which of the security services is/are not provided by digital signature?
asked
Apr 30, 2018
in
Computer Networks
by
Kartavya Kothari
(
133
points)

132
views
madeeasytestseries
computernetworks
networksecurity
0
votes
3
answers
22
ISRO201877
What is one advantage of setting up a $DMZ$ (Demilitarized Zone) with two firewalls? You can control where traffic goes in the three networks You can do statefull packet filtering You can do load balancing Improve network performance
asked
Apr 22, 2018
in
Computer Networks
by
Arjun
Veteran
(
395k
points)

610
views
isro2018
computernetworks
networksecurity
firewalls
+2
votes
3
answers
23
BARC 2018
$\textbf{VPN}$ Works at which layer? Application layer Transport layer Network layer Datalink layer
asked
Apr 5, 2018
in
Computer Networks
by
hacker16
Active
(
3k
points)

396
views
computernetworks
networksecurity
barc2018
0
votes
0
answers
24
Ace Test Series: Computer Networks  Network Security
If p is any prime number such that a p1 =r (mod p) and p=3 , a=6 then value of r is ________________
asked
Jan 30, 2018
in
Computer Networks
by
Agam
(
19
points)

103
views
computernetworks
networksecurity
acetestseries
+2
votes
0
answers
25
Cryptography  RSA Algorithm
In RSA Algorithm, we have public key(e,n) and private key(d,n). Sender side we encrypt plain text P as an integer between 0 and n1 as follows: $P^{e}modn$ ... message P we are taking it as as integer between 0 and n1. So, the P may not be coprime to n. Then how does the algorithm work?
asked
Jan 12, 2018
in
Computer Networks
by
Ashish Sharma 3
(
399
points)

421
views
networksecurity
computernetworks
rsasecuritynetworks
cryptography
+1
vote
0
answers
26
MadeEasy Test Series: Computer Networks  Network Security
Please explain
asked
Jan 7, 2018
in
Computer Networks
by
charul
Active
(
1.3k
points)

42
views
madeeasytestseries
computernetworks
networksecurity
rsasecuritynetworks
+1
vote
0
answers
27
Network security
here e and z should be relative prime .. But is there any bound on e i.e it should be minimum.... because 43 satisfies it.. but ans is 3
asked
Jan 7, 2018
in
Computer Networks
by
Pawan Kumar 2
Active
(
4.8k
points)

78
views
networksecurity
+2
votes
2
answers
28
RSA Public key Cryptosystem
Plz tell me how to solve this .I am feeling problem o calculate  10 = p^5 mod 35 . How to solve this type of question quickly.
asked
Jan 4, 2018
in
Computer Networks
by
ashwina
Active
(
2.1k
points)

370
views
computernetworks
networksecurity
rsasecuritynetworks
+2
votes
2
answers
29
ISRODEC201729
Using public key cryptography, $X$ adds a digital signature $\sigma$ to a message $M,$ encrypts $\langle M,\sigma \rangle$ and sends it to $Y,$ where it is decrypted. Which one of the following sequence of keys is used for operations ? Encryption: ${X}'s$ private key ... ${Y}'s$ private key; Decryption:${Y}'s$ public key followed by ${X}'s$ private key.
asked
Dec 17, 2017
in
Computer Networks
by
gatecse
Boss
(
18.2k
points)

623
views
isrodec2017
networksecurity
Page:
1
2
3
4
next »
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
How to prepare for IISC Interdisciplinary Mathematical Sciences Interview
GO Hardcopy for GATE 2020
How to prepare for BARC interview
IIIT H
Tips for COAP2019
Follow @csegate
Recent questions tagged networksecurity
Recent Blog Comments
What is the cutoff for M.Tech AI at IISc?
Yup. Hard copy contains a unique QR code for...
Lol. I got left out of IIT Kanpur GATE cutoff by...
Don't worry brother... i hope fate is also get...
50,049
questions
53,194
answers
184,531
comments
70,403
users