GATE Exam  Aptitude Questions  GATE Syllabus  GATE Result  Mock Test  GATE Preparation
Best Answer to Any Question
Toggle navigation
GATE FORUM
Email or Username
Password
Remember
Login
Register

I forgot my password
Ask a Question
Submit Question
Recent questions and answers in Network security: key cryptography, digital signatures, firewalls
Ask a question:
0
votes
1
answer
Anarkali digitally signs a message and sends it to Salim. Verification of the signature by Salim requires
Anarkali digitally signs a message and sends it to Salim. Verification of the signature by Salim requires A Anarkali’s public key. B Salim’s public key. C Salim’s private key. D Anarkali’s private key
answered
in
Network security: key cryptography, digital signatures, firewalls
by
gate
0
votes
1
answer
sender is employing public key cryptography to send a secret message to a receiver
A sender is employing public key cryptography to send a secret message to a receiver. Which one of the following statements is TRUE? A Sender encrypts using receiver’s public key B Sender encrypts using his own public key C Receiver decrypts using sender’s public key D Receiver decrypts using his own public key
answered
in
Network security: key cryptography, digital signatures, firewalls
by
gate
0
votes
1
answer
message digest by the network security protocols
Which of the following are used to generate a message digest by the network security protocols? (P) RSA (Q) SHA1 (R) DES (S) MD5
answered
in
Network security: key cryptography, digital signatures, firewalls
by
gate
0
votes
1
answer
RSA public key cryptosystem, the private and public keys
In the RSA public key cryptosystem, the private and public keys are (e, n) and (d, n) respectively, where n = p*q and p and q are large primes. Besides, n is public and p and q are private. Let M be an integer such that 0 < M < n and f(n) = (p 1)(q1). Now consider the following equations. I. M’= Me mod n M = (M’)d mod n II. ed ≡ 1 mod n III. ed ≡ 1 mod f(n) IV. M’= Me mod f(n) M = (M’)d mod f(n) Which of the above equations correctly represent RSA cryptosystem? A I and II B I and III C II and IV D III and IV
answered
in
Network security: key cryptography, digital signatures, firewalls
by
gate
0
votes
1
answer
GATE2004IT_25public key cryptography to send a secret message to a receiver. Which one of the following statements is TRUE?
A sender is employing public key cryptography to send a secret message to a receiver. Which one of the following statements is TRUE? A) Sender encrypts using receiver's public key B) Sender encrypts using his own public key C) Receiver decrypts using sender's public key D) Receiver decrypts using his own public key
answered
in
Network security: key cryptography, digital signatures, firewalls
by
anonymous
computernetworks
networksecurity
publickeycryptography
gate2004it
Help get things started by
asking a question
.
The best answer to any question
All categories
Computer Science & Information Technology
453
Computer Science
10
Information Technology
0
Digital Logic
10
Computer Architecture
28
Programming
38
Data Structures
67
Algorithms
66
Theory of Computation
45
Compiler Design
28
Operating System
44
Databases
46
Computer Networks
65
Computer Networks
4
Concept of layering & LAN technologies (Ethernet)
7
Flow and error control techniques, switching
11
IPv4/IPv6
6
routers and routing algorithms (distance vector, link state)
5
TCP/UDP and sockets
10
congestion control
2
Application layer protocols (DNS, SMTP, POP, FTP, HTTP)
9
Basics of WiFi
1
Network security: key cryptography, digital signatures, firewalls
5
networking
3
Mathematics
81
Aptitude Questions
114
GATE
94
Online Aptitude Test
6
Gate Exam
22
Gate Syllabus
6
Gate Preparation
36
Gate Coaching
14
Online Registration
21
Electronics and Communication (EC)
0
Electrical Engineering (EE)
3
Civil Engineering (CE)
0
Mechanical Engineering (ME)
1
Aerospace Engineering (AE)
0
Agricultural Engineering (AG)
0
Architecture and Planning (AR)
0
Biotechnology (BT)
0
Chemical Engineering (CH)
0
Chemistry (CY)
0
Ecology and Evolution (EY)
0
Geology and Geophysics (GG)
0
Instrumentation Engineering (IN)
0
Mining Engineering (MN)
0
Metallurgical Engineering (MT)
0
Petroleum Engineering (PE)
0
Physics (PH)
0
Production and Industrial Engineering (PI)
0
Textile Engineering and Fibre Science (TF)
0
Engineering Sciences
0
Life Sciences
0
Mathematics (MA)
0
Recent questions and answers in Network security: key cryptography, digital signatures, firewalls