Recent questions tagged network-security

0 votes
0 answers
31
0 votes
1 answer
37
suppose that a message has been encrypted using DES in chipertext block chaining mode. One bit of chipertext in block Ci is accedntally transformed from 0to 1during trans...
0 votes
1 answer
38
Using RSA key crypto system with a = 1, b = 2 etc; value for encryption if prime value are p = 7 and q = 11, the legal value for secret key is .a)69b)49c)49d)119
0 votes
1 answer
39
3 votes
2 answers
40
Which of following risk may arise when same key is used to encrypt direction of communication channel,that are not present if we use different key in both directions ?A. ...
2 votes
1 answer
45
Avalanche effect in cryptographyIs desirable property of cryptographic algorithmIs undesirable property of cryptographic algorithmHas no effect on encryption algorithmNon...
2 votes
3 answers
46
2 votes
4 answers
47
Which one of the following algorithm is not used in asymmetric key cryptography?RSA AlgorithmGillie-Hellman AlgorithmElectronic Code Book AlgorithmNone of the above
2 votes
3 answers
48
$\textbf{VPN}$ Works at which layer?Application layerTransport layerNetwork layerData-link layer
0 votes
0 answers
49
1 votes
0 answers
52
here e and z should be relative prime .. But is there any bound on e i.e it should be minimum.... because 43 satisfies it.. but ans is 3
2 votes
2 answers
53
Plz tell me how to solve this .I am feeling problem o calculate 10 = p^5 mod 35 . How to solve this type of question quickly.
2 votes
2 answers
54
0 votes
1 answer
55
Why do we need a "trusted third party" between a client and a receiver when sending a message with a digital signature?I mean what are the consequences if we don't do tha...
0 votes
1 answer
58
In cryptography, we get privacy for Sender and ReceiverBut why digital signature doesnot provide privacy?Any good reason for it?
0 votes
1 answer
60