Time Left - 15:00 mins
GATE 2019 - Computer Network Quiz-11 (Network Securites ) (App update required to attempt this test)
Attempt now to get your rank among 401 students!
Question 1
Alice and Bob want to send the data to each other securely. They want to use the shared key to do that. They use the Diffie-Hellman algorithm to generate the shared key. In Diffie-Hellman if p = 23 and g = 5, and Alice chooses the secret number a = 4, and Bob chooses the secret number b =3 What is the secret key that is generated ________?
Question 2
The minimum positive integer p such that 2p modulo 11 = 1 is
Question 3
Consider a case where you are implementing RSA algo for the purpose of data security in such away such that the value of P happens to be 7 and the value of Q happens to be 11, then the find legal value of encryption key ?
Question 4
Consider a case where you are implementing RSA algo for the purpose of data security in such away such that the value of P happens to be 7 and the value of Q happens to be 11, then the find decryption key if the legal value of encryption key happens to be 13 ?
Question 5
Consider the following plaintext
GOOD MORNING
Suppose this text is transposition encrypted with key
Then the ciphertext would be
GOOD MORNING
Suppose this text is transposition encrypted with key
Then the ciphertext would be
Question 6
A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place.
(I) S can launch a birthday attack to replace m with a fraudulent message.
(II) A third party attacker can launch a birthday attack to replace m with a fraudulent message.
(III) R can launch a birthday attack to replace m with a fraudulent message.
Which of the following are possible security violations?
- 401 attempts
- 1 upvote
- 1 comment
Mar 30GATE & PSU CS