Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged network-security
0
votes
0
answers
31
Security
It is impossible to produce a document that differs from the original document with single bit change and valid signature I am unable to understand, why is it impossible? bit changing is one way of intruder to steal information.right? plz give some valid reason
It is impossible to produce a document that differs from the original document with single bit change and valid signatureI am unable to understand, why is it impossible? ...
srestha
233
views
srestha
asked
Dec 30, 2018
Computer Networks
network-security
computer-networks
+
–
3
votes
1
answer
32
GATE Overflow | Mock GATE | Test 1 | Question: 22
Which of the following is TRUE with respect to Diffie-Hellman Key exchange algorithm? It can be used for encryption or decryption purpose It doesn't suffer from man in the middle attack It suffers from bucket brigade attack It is an example of private key cryptography algorithm
Which of the following is TRUE with respect to Diffie-Hellman Key exchange algorithm?It can be used for encryption or decryption purposeIt doesn't suffer from man in the ...
Ruturaj Mohanty
2.2k
views
Ruturaj Mohanty
asked
Dec 27, 2018
Computer Networks
go-mockgate-1
computer-networks
network-security
+
–
0
votes
0
answers
33
gfg quiz
From a large set of prime numbers Jimmy choose 23 and 17 as P and Q respectively and a random integer to be 13. Jimmy wants to sends a plain text to M = 127. What will be the value of cipher text using RSA? since i am getting ciphertext =(127^13) mod 391 now how should i calculate
From a large set of prime numbers Jimmy choose 23 and 17 as P and Q respectively and a random integer to be 13. Jimmy wants to sends a plain text to M = 127. What will be...
vijju532
485
views
vijju532
asked
Dec 17, 2018
Computer Networks
computer-networks
network-security
rsa-security-networks
+
–
0
votes
2
answers
34
GATEBOOK_CN_20
Let M be a confidential email that Alice wants to send to Bob, $K_B$ be Bob's encryption public key, and $K_A^{-1}$ be Alice's private key for signing. Which of the following options would be the best choice for protecting confidential ... message, Alice should sign the encrypted message and then should send this signature along with the encrypted message to BOB. Please help.
Let M be a confidential email that Alice wants to send to Bob, $K_B$ be Bob’s encryption public key, and $K_A^{-1}$ be Alice’s private key for signing. Which of the...
Ayush Upadhyaya
1.9k
views
Ayush Upadhyaya
asked
Nov 27, 2018
Computer Networks
network-security
computer-networks
+
–
0
votes
0
answers
35
GATEBOOK_CN4_19
Consider RSA with p = 31 and q = 47. I. n = 1457 II. z= 1200 III. 7 is acceptable choice for e Which of the following is true ? A. Only I B. Only I and II C. Only I and III D. All of I,II and II I am Getting answer (C), but answer is given (D). As per kurose Ross, Z is defined to be $(p-1)(q-1)$
Consider RSA with p = 31 and q = 47. I. n = 1457 II. z= 1200 III. 7 is acceptable choice for eWhich of the following is true ? A. Only I B. Only I and II C. Only I and II...
Ayush Upadhyaya
598
views
Ayush Upadhyaya
asked
Nov 27, 2018
Computer Networks
computer-networks
network-security
+
–
1
votes
1
answer
36
Ace Test Series: Computer Networks - RSA Algorithm
Shankar Kakde
481
views
Shankar Kakde
asked
Nov 1, 2018
Computer Networks
computer
network-security
rsa-security-networks
ace-test-series
+
–
0
votes
1
answer
37
network security
suppose that a message has been encrypted using DES in chipertext block chaining mode. One bit of chipertext in block Ci is accedntally transformed from 0to 1during transmissin. How much plaintext will be grabled as a result? a)1 b)2 c)n- d)n-i+1
suppose that a message has been encrypted using DES in chipertext block chaining mode. One bit of chipertext in block Ci is accedntally transformed from 0to 1during trans...
balaganesh
634
views
balaganesh
asked
Oct 28, 2018
Computer Networks
network-security
+
–
0
votes
1
answer
38
Cryptography
Using RSA key crypto system with a = 1, b = 2 etc; value for encryption if prime value are p = 7 and q = 11, the legal value for secret key is . a)69 b)49 c)49 d)119
Using RSA key crypto system with a = 1, b = 2 etc; value for encryption if prime value are p = 7 and q = 11, the legal value for secret key is .a)69b)49c)49d)119
Shivangi Parashar 2
1.2k
views
Shivangi Parashar 2
asked
Oct 12, 2018
Computer Networks
cryptography
network-security
computer-networks
+
–
0
votes
1
answer
39
DES Algorithm
Na462
1.2k
views
Na462
asked
Sep 20, 2018
Computer Networks
computer-networks
network-security
+
–
3
votes
2
answers
40
Network Security
Which of following risk may arise when same key is used to encrypt direction of communication channel,that are not present if we use different key in both directions ? A. Reflection attack B. Denial of Service C. Eavesdropping D. None
Which of following risk may arise when same key is used to encrypt direction of communication channel,that are not present if we use different key in both directions ?A. ...
Na462
753
views
Na462
asked
Sep 15, 2018
Computer Networks
computer-networks
network-security
+
–
1
votes
4
answers
41
MadeEasy Test Series: Computer Networks - Network Security
DH key exchange algorithm is used to establish a session between sender and receiver with n=23 and g=5. The sender's secret key is 6 and the receiver's secret key is 15. What is the secret key between the receiver and sender? Please explain with solution P.S: Answer is given as 2
DH key exchange algorithm is used to establish a session between sender and receiver with n=23 and g=5. The sender's secret key is 6 and the receiver's secret key is 15. ...
Kalpataru Bose
563
views
Kalpataru Bose
asked
Aug 18, 2018
Computer Networks
made-easy-test-series
network-security
computer-networks
+
–
0
votes
0
answers
42
MadeEasy Test Series: Computer Networks - Network Switching
Ques. Which of the following is incorrect? A. In circuit switched network, switches require connection establishment and teardown phases, where as in packet switched network doesn't. B. Unlike packet switching, circuit ... . D. Under some circumstance, a circuit switched network may prevent some sender from starting new conversation.
Ques. Which of the following is incorrect?A. In circuit switched network, switches require connection establishment and teardown phases, where as in packet switched netw...
Brij gopal Dixit 1
433
views
Brij gopal Dixit 1
asked
Jul 14, 2018
Computer Networks
made-easy-test-series
computer-networks
network-security
+
–
0
votes
2
answers
43
MadeEasy Test Series 2018: Computer Networks - Network Security
Consider the following services in network security: 1. Authentication of message 2. Integrity 3. Privacy 4. Non repudiation Which of the security services is/are not provided by digital signature?
Consider the following services in network security:1. Authentication of message2. Integrity3. Privacy4. Non repudiationWhich of the security services is/are not provided...
Kartavya Kothari
7.4k
views
Kartavya Kothari
asked
Apr 30, 2018
Computer Networks
made-easy-test-series
computer-networks
network-security
+
–
6
votes
3
answers
44
ISRO2018-46
In cryptography, the following uses transposition ciphers and the keyword is LAYER. Encrypt the following message. (Spaces are omitted during encrypton) $\text{WELCOME TO NETWORK SECURITY!}$ $\text{WMEKREETSILTWETCOOCYONRU!}$ $\text{EETSICOOCYWMEKRONRU!LTWET}$ $\text{LTWETONRU!WMEKRCOOCYEETSI}$ $\text{ONRU!COOCYLTWETEETSIWMEKR}$
In cryptography, the following uses transposition ciphers and the keyword is LAYER. Encrypt the following message. (Spaces are omitted during encrypton)$\text{WELCOME TO ...
Arjun
7.6k
views
Arjun
asked
Apr 22, 2018
Computer Networks
isro2018
computer-networks
network-security
+
–
2
votes
1
answer
45
ISRO2018-74
Avalanche effect in cryptography Is desirable property of cryptographic algorithm Is undesirable property of cryptographic algorithm Has no effect on encryption algorithm None of the above
Avalanche effect in cryptographyIs desirable property of cryptographic algorithmIs undesirable property of cryptographic algorithmHas no effect on encryption algorithmNon...
Arjun
2.3k
views
Arjun
asked
Apr 22, 2018
Computer Networks
isro2018
computer-networks
network-security
+
–
2
votes
3
answers
46
ISRO2018-77
What is one advantage of setting up a $\text{DMZ}$ (Demilitarized Zone) with two firewalls? You can control where traffic goes in the three networks You can do statefull packet filtering You can do load balancing Improve network performance
What is one advantage of setting up a $\text{DMZ}$ (Demilitarized Zone) with two firewalls?You can control where traffic goes in the three networksYou can do statefull pa...
Arjun
4.0k
views
Arjun
asked
Apr 22, 2018
Computer Networks
isro2018
computer-networks
network-security
firewall
+
–
2
votes
4
answers
47
ISRO2018-78
Which one of the following algorithm is not used in asymmetric key cryptography? RSA Algorithm Gillie-Hellman Algorithm Electronic Code Book Algorithm None of the above
Which one of the following algorithm is not used in asymmetric key cryptography?RSA AlgorithmGillie-Hellman AlgorithmElectronic Code Book AlgorithmNone of the above
Arjun
14.2k
views
Arjun
asked
Apr 22, 2018
Computer Networks
isro2018
computer-networks
network-security
cryptography
+
–
2
votes
3
answers
48
BARC 2018
$\textbf{VPN}$ Works at which layer? Application layer Transport layer Network layer Data-link layer
$\textbf{VPN}$ Works at which layer?Application layerTransport layerNetwork layerData-link layer
hacker16
1.3k
views
hacker16
asked
Apr 5, 2018
Computer Networks
computer-networks
network-security
barc2018
+
–
0
votes
0
answers
49
Ace Test Series: Computer Networks - Network Security
If p is any prime number such that a p-1 =r (mod p) and p=3 , a=6 then value of r is ________________
If p is any prime number such that a p-1 =r (mod p) and p=3 , a=6 then value of r is ________________
Agam
425
views
Agam
asked
Jan 30, 2018
Computer Networks
computer-networks
network-security
ace-test-series
+
–
2
votes
0
answers
50
Cryptography - RSA Algorithm
In RSA Algorithm, we have public key(e,n) and private key(d,n). Sender side we encrypt plain text P as an integer between 0 and n-1 as follows: $P^{e}modn$ ... message P we are taking it as as integer between 0 and n-1. So, the P may not be coprime to n. Then how does the algorithm work?
In RSA Algorithm, we have public key(e,n) and private key(d,n).Sender side we encrypt plain text P as an integer between 0 and n-1 as follows:$P^{e}modn$and send it.At re...
Ashish Sharma 3
1.1k
views
Ashish Sharma 3
asked
Jan 12, 2018
Computer Networks
network-security
computer-networks
rsa-security-networks
cryptography
+
–
1
votes
0
answers
51
MadeEasy Test Series: Computer Networks - Network Security
Please explain
Please explain
charul
417
views
charul
asked
Jan 7, 2018
Computer Networks
made-easy-test-series
computer-networks
network-security
rsa-security-networks
+
–
1
votes
0
answers
52
Network security
here e and z should be relative prime .. But is there any bound on e i.e it should be minimum.... because 43 satisfies it.. but ans is 3
here e and z should be relative prime .. But is there any bound on e i.e it should be minimum.... because 43 satisfies it.. but ans is 3
Pawan Kumar 2
320
views
Pawan Kumar 2
asked
Jan 6, 2018
Computer Networks
network-security
+
–
2
votes
2
answers
53
RSA Public key Cryptosystem
Plz tell me how to solve this .I am feeling problem o calculate -- 10 = p^5 mod 35 . How to solve this type of question quickly.
Plz tell me how to solve this .I am feeling problem o calculate 10 = p^5 mod 35 . How to solve this type of question quickly.
dragonball
1.9k
views
dragonball
asked
Jan 4, 2018
Computer Networks
computer-networks
network-security
rsa-security-networks
+
–
2
votes
2
answers
54
ISRO-DEC2017-29
Using public key cryptography, $X$ adds a digital signature $\sigma$ to a message $M,$ encrypts $\langle M,\sigma \rangle$ and sends it to $Y,$ ... public key followed by ${Y}'s$ private key; Decryption:${Y}'s$ public key followed by ${X}'s$ private key.
Using public key cryptography, $X$ adds a digital signature $\sigma$ to a message $M,$ encrypts $\langle M,\sigma \rangle$ and sends it to $Y,$ where it is decrypted. Whi...
gatecse
1.6k
views
gatecse
asked
Dec 17, 2017
Computer Networks
isrodec2017
network-security
+
–
0
votes
1
answer
55
Digital signature doubt
Why do we need a "trusted third party" between a client and a receiver when sending a message with a digital signature? I mean what are the consequences if we don't do that?
Why do we need a "trusted third party" between a client and a receiver when sending a message with a digital signature?I mean what are the consequences if we don't do tha...
Mahendra Singh Kanya
607
views
Mahendra Singh Kanya
asked
Dec 15, 2017
Computer Networks
computer-networks
network-security
digital-signature
+
–
0
votes
0
answers
56
How digital certificate works ?
hem chandra joshi
337
views
hem chandra joshi
asked
Dec 15, 2017
Computer Networks
network-security
+
–
0
votes
1
answer
57
MadeEasy Test Series: Computer Networks - Network Security
s1 only s1 and s2 s2,s3,s4 none of these
s1 onlys1 and s2s2,s3,s4none of these
Shivi rao
400
views
Shivi rao
asked
Dec 12, 2017
Computer Networks
made-easy-test-series
computer-networks
network-security
rsa-security-networks
+
–
0
votes
1
answer
58
Digital Signature
In cryptography, we get privacy for Sender and Receiver But why digital signature doesnot provide privacy? Any good reason for it?
In cryptography, we get privacy for Sender and ReceiverBut why digital signature doesnot provide privacy?Any good reason for it?
srestha
1.5k
views
srestha
asked
Dec 12, 2017
Computer Networks
computer-networks
digital-signature
network-security
+
–
0
votes
1
answer
59
MadeEasy Test Series: Computer Networks - Network Security
Consider the following statements with respect to digital signatures: S1: Digital signature ensures authenticity of the sender but not integrity of the message. S2: A single secret key can be used by the sender to sign multiple ... Both RSA cryptosystem and RSA digital signature scheme uses same set of keys. Which of the following is true?
Consider the following statements with respect to digital signatures:S1: Digital signature ensures authenticity of the sender but not integrity of the message.S2: A singl...
Appu B
1.8k
views
Appu B
asked
Dec 3, 2017
Computer Networks
made-easy-test-series
computer-networks
cryptography
network-security
rsa-security-networks
+
–
0
votes
1
answer
60
Computer network network security
Please explain theorem in simplest way and solve example with explanation. Using RSA algorithm what is the value of cipher test c if the plain text m=5 and P=3, q=11 & d = 7 ( if d not given how to find d ).
Please explain theorem in simplest way and solve example with explanation.Using RSA algorithm what is the value of cipher test c if the plain text m=5 and P=3, q=11 & d =...
Harikesh Kumar
778
views
Harikesh Kumar
asked
Dec 2, 2017
Computer Networks
network-security
computer-networks
rsa-security-networks
+
–
Page:
« prev
1
2
3
4
5
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register