Login
Register
@
Dark Mode
Profile
Edit my Profile
Messages
My favorites
Register
Activity
Q&A
Questions
Unanswered
Tags
Subjects
Users
Ask
Previous Years
Blogs
New Blog
Exams
Dark Mode
Recent questions tagged rsa-security-networks
0
votes
4
answers
1
UGC NET CSE | January 2017 | Part 3 | Question: 29
In RSA public key cryptosystem suppose $n=p*q$ where $p$ and $q$ are primes. $(e,n)$ and $(d,n)$ are public and private keys respectively. Let $M$ be an integer such that $o< M< n$ and $\phi(n)=(p-1)(q-1)$. Which of the following equations ... I and II I and III II and III I and IV
go_editor
asked
in
Computer Networks
Mar 24, 2020
by
go_editor
522
views
ugcnetcse-jan2017-paper3
computer-networks
rsa-security-networks
1
vote
1
answer
2
UGC NET CSE | June 2019 | Part 2 | Question: 90
The RSA encryption algorithm also works in reverse, that is, you can encrypt a message with the private key and decrypt it using the public key. This property is used in instruction detection systems digital signatures data compression certification
Arjun
asked
in
Computer Networks
Jul 2, 2019
by
Arjun
1.9k
views
ugcnetcse-june2019-paper2
network-security
rsa-security-networks
computer-networks
0
votes
1
answer
3
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 18 (Page No. 873)
Alice and Bob use RSA public key encryption in order to communicate between them. Trudy finds out that Alice and Bob shared one of the primes used to determine the number n of their public key pairs. In other words, Trudy found out that na = pa × q and nb = pb × q. How can Trudy use this information to break Alice’s code?
ajaysoni1924
asked
in
Computer Networks
Mar 19, 2019
by
ajaysoni1924
687
views
computer-networks
network-security
rsa-security-networks
tanenbaum
1
vote
2
answers
4
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 17 (Page No. 873)
Using the RSA public key cryptosystem, with a = 1, b = 2 . . . y = 25, z = 26. (a) If p = 5 and q = 13, list five legal values for d. (b) If p = 5, q = 31, and d = 37, find e. (c) Using p = 3, q = 11, and d = 9, find e and encrypt ‘‘hello’’.
ajaysoni1924
asked
in
Computer Networks
Mar 19, 2019
by
ajaysoni1924
1.3k
views
computer-networks
tanenbaum
network-security
rsa-security-networks
0
votes
0
answers
5
gfg quiz
From a large set of prime numbers Jimmy choose 23 and 17 as P and Q respectively and a random integer to be 13. Jimmy wants to sends a plain text to M = 127. What will be the value of cipher text using RSA? since i am getting ciphertext =(127^13) mod 391 now how should i calculate
vijju532
asked
in
Computer Networks
Dec 17, 2018
by
vijju532
312
views
computer-networks
network-security
rsa-security-networks
1
vote
1
answer
6
Ace Test Series: Computer Networks - RSA Algorithm
Shankar Kakde
asked
in
Computer Networks
Nov 1, 2018
by
Shankar Kakde
320
views
computer
network-security
rsa-security-networks
ace-test-series
2
votes
2
answers
7
MadeEasy Full Length Test 2019: Computer Networks - Rsa Security Networks
In an RSA system, the public key of given user is e = 31 and n = 3599. The private key of user will be ________
piya
asked
in
Computer Networks
Jul 23, 2018
by
piya
8.5k
views
computer-networks
rsa-security-networks
cryptography
made-easy-test-series
2
votes
3
answers
8
self doubt RSA Algorithm
How To Solve..? 17 * d = 1 mod 3120. should we need to apply bruteforce?
hacker16
asked
in
Computer Networks
Jan 29, 2018
by
hacker16
1.8k
views
rsa-security-networks
2
votes
0
answers
9
Cryptography - RSA Algorithm
In RSA Algorithm, we have public key(e,n) and private key(d,n). Sender side we encrypt plain text P as an integer between 0 and n-1 as follows: $P^{e}modn$ ... message P we are taking it as as integer between 0 and n-1. So, the P may not be coprime to n. Then how does the algorithm work?
Ashish Sharma 3
asked
in
Computer Networks
Jan 12, 2018
by
Ashish Sharma 3
840
views
network-security
computer-networks
rsa-security-networks
cryptography
1
vote
0
answers
10
MadeEasy Test Series: Computer Networks - Network Security
Please explain
charul
asked
in
Computer Networks
Jan 7, 2018
by
charul
249
views
made-easy-test-series
computer-networks
network-security
rsa-security-networks
2
votes
2
answers
11
RSA Public key Cryptosystem
Plz tell me how to solve this .I am feeling problem o calculate -- 10 = p^5 mod 35 . How to solve this type of question quickly.
dragonball
asked
in
Computer Networks
Jan 4, 2018
by
dragonball
1.5k
views
computer-networks
network-security
rsa-security-networks
0
votes
1
answer
12
MadeEasy Test Series: Computer Networks - Network Security
s1 only s1 and s2 s2,s3,s4 none of these
Shivi rao
asked
in
Computer Networks
Dec 13, 2017
by
Shivi rao
276
views
made-easy-test-series
computer-networks
network-security
rsa-security-networks
0
votes
2
answers
13
RSA cryptosystem
Alice chooses 5 and 11 as P and Q respectively and e is a random number 13. Public key for Alice 35. Private key for Bob 17. What is the value of Cipher text for Alice,Plain text for Bob, Private key for Alice, Public key for Bob? ------------------------------ ... --------------------------------- Now I got confuse with formula and logic Can someone tell me which logic used where?
srestha
asked
in
Computer Networks
Dec 11, 2017
by
srestha
2.4k
views
computer-networks
rsa-security-networks
0
votes
1
answer
14
MadeEasy Test Series: Computer Networks - Network Security
Consider the following statements with respect to digital signatures: S1: Digital signature ensures authenticity of the sender but not integrity of the message. S2: A single secret key can be used by the sender to sign multiple ... Both RSA cryptosystem and RSA digital signature scheme uses same set of keys. Which of the following is true?
Appu B
asked
in
Computer Networks
Dec 3, 2017
by
Appu B
1.4k
views
made-easy-test-series
computer-networks
cryptography
network-security
rsa-security-networks
0
votes
1
answer
15
Computer network network security
Please explain theorem in simplest way and solve example with explanation. Using RSA algorithm what is the value of cipher test c if the plain text m=5 and P=3, q=11 & d = 7 ( if d not given how to find d ).
Harikesh Kumar
asked
in
Computer Networks
Dec 2, 2017
by
Harikesh Kumar
662
views
network-security
computer-networks
rsa-security-networks
1
vote
0
answers
16
CN Network Security
Message digest provides only message authentication or can it provide user authentication also? MDC is a digest for message authentication.Can i also say MAC is also a digest for sender authentication?Please explain this
rahul sharma 5
asked
in
Computer Networks
Aug 13, 2017
by
rahul sharma 5
177
views
computer-networks
computer
rsa-security-networks
0
votes
0
answers
17
network security
Let m be the message and c be the cipher text. public key=(e,n) and private key=(d,n) c=pe mod(n) Now, raising c to power of d mod(n), we get plain text p = cd mod(n)=ped mod(n). Now since p=ped mod(n), this condition should be true : ed=1 mod(Φ(n)). I didn't understand this equation.
Bad_Doctor
asked
in
Computer Networks
Jun 9, 2017
by
Bad_Doctor
267
views
computer
networking
rsa-security-networks
computer-networks
39
votes
12
answers
18
GATE CSE 2017 Set 1 | Question: 44
In a RSA cryptosystem, a participant $A$ uses two prime numbers $p = 13$ and $q = 17$ to generate her public and private keys. If the public key of $A$ is $35$, then the private key of $A$ is __________ .
Arjun
asked
in
Computer Networks
Feb 14, 2017
by
Arjun
19.8k
views
gatecse-2017-set1
network-security
computer-networks
rsa-security-networks
out-of-gate-syllabus
numerical-answers
normal
1
vote
1
answer
19
RSA algorithm
How to find value of d in RSA algorithm given the values of p , n and e ? Example: p=11 q=7 hence n =77 z = 10 × 6 = 60 e =13 (given) Now d should be multiplicative inverse of e mod z.. How to find it ?
Nitesh Methani
asked
in
Computer Networks
Jan 11, 2017
by
Nitesh Methani
865
views
rsa-security-networks
To see more, click for the
full list of questions
or
popular tags
.
Subscribe to GATE CSE 2023 Test Series
Subscribe to GO Classes for GATE CSE 2023
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
-tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
POWER GRID CORPORATION OF INDIA LIMITED
INSTITUTE OF BANKING PERSONNEL SELECTION
GATE Overflow books for TIFR, ISRO, UGCNET and NIELIT
RECRUITMENT IN OIL AND GAS CORPORATION LIMITED
Aptitude Overflow Book
Subjects
All categories
General Aptitude
(2.4k)
Engineering Mathematics
(9.1k)
Digital Logic
(3.2k)
Programming and DS
(5.8k)
Algorithms
(4.5k)
Theory of Computation
(6.6k)
Compiler Design
(2.3k)
Operating System
(4.9k)
Databases
(4.5k)
CO and Architecture
(3.7k)
Computer Networks
(4.5k)
Non GATE
(1.3k)
Others
(2.4k)
Admissions
(647)
Exam Queries
(841)
Tier 1 Placement Questions
(17)
Job Queries
(74)
Projects
(9)
Unknown Category
(854)
Recent questions tagged rsa-security-networks
Recent Blog Comments
@abir_banerjee Thanks Abir. I'm third year...
@nolan_keats Currently I am in third year...
@abir_banerjee thank you Abir.Supposing you...
@nolan_keats just a suggestion as I also...
@abir_banerjee Hope I can do this in span of one...