Recent questions tagged network-security

0 votes
1 answer
61
You generate a perfectly random key K. You send two messages, M1 and M2, encrypted with K (C1 = K xor M1 and C2 = K xor M2). Does sending C2 leak information about M1 and...
0 votes
0 answers
63
0 votes
0 answers
64
WHAT ALL TOPICS SHOULD BE COVERED IN CRYPTOGRAPHY IN NETWORKS.?
4 votes
3 answers
68
Pretty Good Privacy (PGP) is used in:Browser securityFTP securityEmail securityNone of the above
5 votes
1 answer
69
Which protocol suite designed by IETF to provide security for a packet at the Internet layer?IPSecNetSecPacketSecSSL
6 votes
3 answers
70
$\text{MD5}$ is a widely used hash function for producing hash value of$64$ bits$128$ bits$512$ bits$1024$ bits
0 votes
0 answers
71
0 votes
1 answer
74
Q6. ___________Data Encryption Standard (DES) was designed to increase the size of the Data Encryption Standard (DES) key.(A) Double(B) Triple(C) Quadruple(D) none of the...
0 votes
2 answers
75
Q3: What kind of ciphers Electronic Codebook (ECB) mode and Cipher Block Chaining (CBC) mode are(A) Block cipher(B) Stream cipher(C) Field cipher(D) both (A) and (B)
0 votes
0 answers
76
2 votes
2 answers
77
Suppose that in RSA encryption, the public encryption key is the pair (e n)= (3, 55) and the private decryption key is the pair (d,n)=55, where d(A) 13(B) 27(C) 37(D) 39
0 votes
1 answer
81
1 votes
0 answers
83
From where shall I study cryptography and network security for GATE?
2 votes
1 answer
84
Encrypt the plain text message $ \text{EXTRANET}"$ using Transposition cipher technique with the following key : $\begin{array} {|l|l|l|l|l|} \hline \text{3} & \text{5} ...
3 votes
2 answers
85
2 votes
2 answers
86
3 votes
1 answer
87
2 votes
2 answers
88