Computer Network
Q101.
Consider the following two statements: i.A hash function (these are often used for computing digital signatures) is an injective function. ii.A. encryption technique such as DES performs a permutation on the elements of its input alphabet. Which one of the following options is valid for the above two statements?Q104.
You are given the following four bytes : \begin{array}{|l|l|l|l|l|l|l|l|l|l|} \hline 10100011 & 00110111 & 11101001 & 10101011 \\ \hline \end{array} Which of the following are substrings of the base 64 encoding of the above four bytes?Q105.
A firewall is to be configured to allow hosts in a private network to freely open TCP connections and send packets on open connections. However, it will only allow external hosts to send packets on existing open TCP connections or connections that are being opened (by internal hosts) but not allow them to open TCP connections to hosts in the private network. To achieve this the minimum capability of the firewall should be that ofQ107.
Suppose that two parties A and B wish to setup a common secret key (D-H key) between themselves using the Diffie-Hellman key exchange technique. They agree on 7 as the modulus and 3 as the primitive root. Party A chooses 2 and party B chooses 5 as their respective secrets. Their D-H key isQ108.
Which of the following statement(s) is TRUE? I. A hash function takes a message of arbitrary length and generates a fixed length code. II. A hash function takes a message of fixed length and generates a code of variable length. III. A hash function may give the same hash value for distinct messages.Q110.
A sender is employing public key cryptography to send a secret message to a receiver. Which one of the following statements is TRUE?