Computer Network


Q81.

Which one of the following are used to generate a message digest by the network security protocols? (P) RSA (Q) SHA-1 (R) DES (S) MD5
GateOverflow

Q82.

If a class C is derived from class B, which is derived form class A, all through public inheritance, then a class C member function can access
GateOverflow

Q83.

Which of the following encryption algorithms is based on the Feistal structure?
GateOverflow

Q84.

Consider that B wants to send a message m that is digitally signed to A. Let the pair of private and public keys for A and B be denoted by K_{x}^{-} and K_{x}^{+} for x = A,B, respectively. Let K_{x}(m) represent the operation of encrypting m with a key K_{x} and H(m) represent the message digest. Which one of the following indicates the CORRECT way of sending the message m along with the digital signature to A?
GateOverflow

Q85.

In a RSA cryptosystem a participant A uses two prime numbers p=13 and q=17 to generate her public and private keys. If the public key of A is 35. Then the private key of A is __________.
GateOverflow

Q86.

Anarkali digitally signs a message and sends it to Salim. Verification of the signature by Salim requires
GateOverflow

Q87.

In a system an RSA algorithm with p=5 and q=11, is implemented for data security. What is the value of the decryption key if the value of the encryption key is 27?
GateOverflow

Q88.

A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place. I. S can launch a birthday attack to replace m with a fraudulent message. II. A third party attacker can launch a birthday attack to replace m with a fraudulent message III. R can launch a birthday attack to replace m with a fraudulent message. Which of the following are possible security violations?
GateOverflow

Q89.

Suppose that everyone in a group of N people wants to communicate secretly with the N-1 others using symmetric key cryptographic system. The communication between any two persons should not be decodable by the others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is
GateOverflow

Q90.

MD5 is a widely used hash function for producing hash value of
GateOverflow