Computer Network


Q81.

If a class C is derived from class B, which is derived form class A, all through public inheritance, then a class C member function can access
GateOverflow

Q82.

Which one of the following are used to generate a message digest by the network security protocols? (P) RSA (Q) SHA-1 (R) DES (S) MD5
GateOverflow

Q83.

Which of the following encryption algorithms is based on the Feistal structure?
GateOverflow

Q84.

A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place. I. S can launch a birthday attack to replace m with a fraudulent message. II. A third party attacker can launch a birthday attack to replace m with a fraudulent message III. R can launch a birthday attack to replace m with a fraudulent message. Which of the following are possible security violations?
GateOverflow

Q85.

Anarkali digitally signs a message and sends it to Salim. Verification of the signature by Salim requires
GateOverflow

Q86.

In a system an RSA algorithm with p=5 and q=11, is implemented for data security. What is the value of the decryption key if the value of the encryption key is 27?
GateOverflow

Q87.

Using public key cryptography, X adds a digital signature \sigma to message M, encrypts \lt M, \sigma \gt, and sends it to Y, where it is decrypted. Which one of the following sequences of keys is used for the operations?
GateOverflow

Q88.

MD5 is a widely used hash function for producing hash value of
GateOverflow

Q89.

What will be the cipher text produced by the following cipher function for the plain text ISRO with key k=7. [ Consider 'A'=0, 'B'=1,....'Z'=25] C_{k} (M) = (kM + 13) \mod 26
GateOverflow

Q90.

Suppose that everyone in a group of N people wants to communicate secretly with the N-1 others using symmetric key cryptographic system. The communication between any two persons should not be decodable by the others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is
GateOverflow