Network Security · Computer Networks · GATE CSE
Marks 1
1
The value of 351 mod 5 is_________.
GATE CSE 2019
2
A sender S sends a message m to receiver R, which is digitally signed by S with its
private key. In this scenario, one or more of the following security violations can take
place.
I. S can launch a birthday attack to replace m with a fraudulent message.
II. A third party attacker can launch a birthday attack to replace m with a fraudulent
message.
III. R can launch a birthday attack to replace m with a fraudulent message.
GATE CSE 2017 Set 1
3
Anarkali digitally signs a message and sends it to Salim. Verification of the signature by Salim requires
GATE CSE 2016 Set 2
4
Suppose that everyone in a group of N people wants to communicate secretly with the N - 1 others using symmetric key cryptographic system. The communication between any two persons should not be decodable by the others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is
GATE CSE 2015 Set 1
5
Which one of the following are used to generate a message digest by the network security protocols?
(P) RSA
(Q) SHA-1
(R) DES
(S) MD5
(P) RSA
(Q) SHA-1
(R) DES
(S) MD5
GATE CSE 2014 Set 1
6
Using public key cryptography, X adds a digital signature σ to message M, encrypts, and sends it to Y, where it is decrypted. Which one of the following sequences of keys is used for the operations?
GATE CSE 2013
7
A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT
GATE CSE 2011
8
Consider the following two statements:
i. A hash function (these are often used for computing digital signatures) is an injective function.
ii. encryption technique such as DES performs a permutation on the elements of its input alphabet.
GATE CSE 2007
9
The minimum positive integer p such that (3p modulo 17) = 1 is
GATE CSE 2007
10
Exponentiation is a heavily used operation in public key cryptography. Which of the following options is the tightest upper bound on the number of multiplications required to compute (bn mod m),$$0 \le b,n \le m$$?
GATE CSE 2007
11
A sender is employing public key Cryptography to send a secret message to a receiver. Which one of the following statement is true?
GATE CSE 2004
Marks 2
1
In an RSA cryptosystem, the value of the public modulus parameter n is 3007. If it is also known that $$\varphi $$(n) = 2880, where $$\varphi $$() denotes Euler's Totient Function, then the prime factor of n which is greater than 50 is ______.
GATE CSE 2019
2
Consider that B wants to send a message m that is digitally signed to A. Let the pair of private and public keys for A and B be denoted by $$K_x^ - $$ and $$K_x^ + $$ for x = A, B, respectively. Let Kx(m) represent the operation of encrypting m with a key Kx and H(m) represent the message digest. Which one of the following indicates the CORRECT way of sending the message m along with the digital signature to A?
GATE CSE 2016 Set 1
3
In the RSA public key cryptosystem, the private and public keys are (e, n) and (d, n) respectively, where n = p$$ \times $$q and p and q are large primes. Besides, n is public and p and q are private. Let M be an integer such that 0 < M < n and f(n) = (p - 1)(q - 1). Now consider the following equations.
I. M'= Me mod n
M = (M')d mod n
II. ed ≡ 1 mod n
III. ed ≡ 1 mod $$\phi $$(n)
IV. M'= Me mod $$\phi $$(n)
M = (M')d mod $$\phi $$(n)
GATE CSE 2009
4
The total number of keys required for a set of n individuals to be able to communicate with each other using secret key and public key crypto-systems, respectively are:
GATE CSE 2008
5
Suppose that two parties A and B wish to setup a common secret key (D - H key) between themselves using the Diffie-Hellman key exchange technique. They agree on 7 as the modulus and 3 as the primitive root. Party A chooses 2 and party B chooses 5 as their respective secrets. Their D - H key is
GATE CSE 2005