The Gateway to Computer Science Excellence
For all GATE CSE Questions
Toggle navigation
Facebook Login
or
Email or Username
Password
Remember
Login
Register

I forgot my password
Activity
Questions
Unanswered
Tags
Subjects
Users
Ask
Prev
Blogs
New Blog
Exams
Recent questions tagged rsasecuritynetworks
0
votes
1
answer
1
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 18 (Page No. 873)
Alice and Bob use RSA public key encryption in order to communicate between them. Trudy finds out that Alice and Bob shared one of the primes used to determine the number n of their public key pairs. In other words, Trudy found out that na = pa × q and nb = pb × q. How can Trudy use this information to break Alice’s code?
asked
Mar 19, 2019
in
Computer Networks
by
ajaysoni1924
Boss
(
10.8k
points)

43
views
computernetworks
networksecurity
rsasecuritynetworks
tanenbaum
+1
vote
2
answers
2
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 17 (Page No. 873)
Using the RSA public key cryptosystem, with a = 1, b = 2 . . . y = 25, z = 26. (a) If p = 5 and q = 13, list five legal values for d. (b) If p = 5, q = 31, and d = 37, find e. (c) Using p = 3, q = 11, and d = 9, find e and encrypt ‘‘hello’’.
asked
Mar 19, 2019
in
Computer Networks
by
ajaysoni1924
Boss
(
10.8k
points)

79
views
computernetworks
networksecurity
rsasecuritynetworks
0
votes
0
answers
3
gfg quiz
From a large set of prime numbers Jimmy choose 23 and 17 as P and Q respectively and a random integer to be 13. Jimmy wants to sends a plain text to M = 127. What will be the value of cipher text using RSA? since i am getting ciphertext =(127^13) mod 391 now how should i calculate
asked
Dec 17, 2018
in
Computer Networks
by
vijju532
Active
(
1.1k
points)

91
views
computernetworks
networksecurity
rsasecuritynetworks
0
votes
1
answer
4
Ace Test Series: Computer Networks  RSA Algorithm
asked
Nov 1, 2018
in
Computer Networks
by
Shankar Kakde
(
195
points)

112
views
computer
networksecurity
rsasecuritynetworks
acetestseries
+2
votes
2
answers
5
MadeEasy Full Length Test 2019: Computer Networks  Rsa Security Networks
In an RSA system, the public key of given user is e = 31 and n = 3599. The private key of user will be ________
asked
Jul 23, 2018
in
Computer Networks
by
piya
(
191
points)

1.2k
views
computernetworks
rsasecuritynetworks
cryptography
madeeasytestseries2019
madeeasytestseries
+1
vote
3
answers
6
self doubt RSA Algorithm
How To Solve..? 17 * d = 1 mod 3120. should we need to apply bruteforce?
asked
Jan 29, 2018
in
Computer Networks
by
hacker16
Active
(
2.7k
points)

390
views
rsasecuritynetworks
+2
votes
0
answers
7
Cryptography  RSA Algorithm
In RSA Algorithm, we have public key(e,n) and private key(d,n). Sender side we encrypt plain text P as an integer between 0 and n1 as follows: $P^{e}modn$ ... message P we are taking it as as integer between 0 and n1. So, the P may not be coprime to n. Then how does the algorithm work?
asked
Jan 12, 2018
in
Computer Networks
by
Ashish Sharma 3
(
341
points)

516
views
networksecurity
computernetworks
rsasecuritynetworks
cryptography
+1
vote
0
answers
8
MadeEasy Test Series: Computer Networks  Network Security
Please explain
asked
Jan 7, 2018
in
Computer Networks
by
charul
Junior
(
823
points)

97
views
madeeasytestseries
computernetworks
networksecurity
rsasecuritynetworks
+2
votes
2
answers
9
RSA Public key Cryptosystem
Plz tell me how to solve this .I am feeling problem o calculate  10 = p^5 mod 35 . How to solve this type of question quickly.
asked
Jan 4, 2018
in
Computer Networks
by
ashwina
Active
(
1.8k
points)

445
views
computernetworks
networksecurity
rsasecuritynetworks
0
votes
1
answer
10
MadeEasy Test Series: Computer Networks  Network Security
s1 only s1 and s2 s2,s3,s4 none of these
asked
Dec 13, 2017
in
Computer Networks
by
Shivi rao
Junior
(
537
points)

96
views
madeeasytestseries
computernetworks
networksecurity
rsasecuritynetworks
0
votes
2
answers
11
RSA cryptosystem
Alice chooses 5 and 11 as P and Q respectively and e is a random number 13. Public key for Alice 35. Private key for Bob 17. What is the value of Cipher text for Alice,Plain text for Bob, Private key for Alice, Public key for Bob?  ...  Now I got confuse with formula and logic Can someone tell me which logic used where?
asked
Dec 11, 2017
in
Computer Networks
by
srestha
Veteran
(
119k
points)

746
views
computernetworks
rsasecuritynetworks
0
votes
1
answer
12
MadeEasy Test Series: Computer Networks  Network Security
Consider the following statements with respect to digital signatures: S1: Digital signature ensures authenticity of the sender but not integrity of the message. S2: A single secret key can be used by the sender to sign multiple ... Both RSA cryptosystem and RSA digital signature scheme uses same set of keys. Which of the following is true?
asked
Dec 3, 2017
in
Computer Networks
by
Appu B
(
259
points)

195
views
madeeasytestseries
computernetworks
cryptography
networksecurity
rsasecuritynetworks
0
votes
1
answer
13
Computer network network security
Please explain theorem in simplest way and solve example with explanation. Using RSA algorithm what is the value of cipher test c if the plain text m=5 and P=3, q=11 & d = 7 ( if d not given how to find d ).
asked
Dec 2, 2017
in
Computer Networks
by
Harikesh Kumar
Junior
(
875
points)

437
views
networksecurity
computernetworks
rsasecuritynetworks
+1
vote
0
answers
14
CN Network Security
Message digest provides only message authentication or can it provide user authentication also? MDC is a digest for message authentication.Can i also say MAC is also a digest for sender authentication?Please explain this
asked
Aug 13, 2017
in
Computer Networks
by
rahul sharma 5
Boss
(
25.6k
points)

86
views
computernetworks
computer
rsasecuritynetworks
0
votes
0
answers
15
network security
Let m be the message and c be the cipher text. public key=(e,n) and private key=(d,n) c=pe mod(n) Now, raising c to power of d mod(n), we get plain text p = cd mod(n)=ped mod(n). Now since p=ped mod(n), this condition should be true : ed=1 mod(Φ(n)). I didn't understand this equation.
asked
Jun 9, 2017
in
Computer Networks
by
Bad_Doctor
Active
(
1.1k
points)

102
views
computer
networking

rsasecuritynetworks
computernetworks
+34
votes
11
answers
16
GATE2017144
In a RSA cryptosystem, a participant $A$ uses two prime numbers $p = 13$ and $q = 17$ to generate her public and private keys. If the public key of $A$ is $35$, then the private key of $A$ is __________ .
asked
Feb 14, 2017
in
Computer Networks
by
Arjun
Veteran
(
431k
points)

8.3k
views
gate20171
networksecurity
computernetworks
rsasecuritynetworks
numericalanswers
normal
+1
vote
1
answer
17
RSA algorithm
How to find value of d in RSA algorithm given the values of p , n and e ? Example: p=11 q=7 hence n =77 z = 10 × 6 = 60 e =13 (given) Now d should be multiplicative inverse of e mod z.. How to find it ?
asked
Jan 11, 2017
in
Computer Networks
by
Nitesh Methani
Active
(
1.1k
points)

536
views
rsasecuritynetworks
To see more, click for the
full list of questions
or
popular tags
.
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
ISRO CSE 2020 PAPER ANALYSE
BARC OCES/DGFS 2020
ISI CMI PDF by GATE Overflow
Calculus Important Points
Management Trainee Recruitment COAL INDIA 2020
Follow @csegate
Recent questions tagged rsasecuritynetworks
Recent Blog Comments
@ben10 There are two questions in it, as per time...
Is official answer key out ??
https://gateoverflow.in/331364/isro202036 ,...
For the postorder to preorder conversion, please...
Getting 111 marks. If big endian option changes...
50,737
questions
57,284
answers
198,184
comments
104,863
users