NEW
New Website Launch
Experience the best way to solve previous year questions with mock tests (very detailed analysis), bookmark your favourite questions, practice etc...
1

GATE CSE 2017 Set 1

MCQ (Single Correct Answer)
A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place.

I. S can launch a birthday attack to replace m with a fraudulent message.
II. A third party attacker can launch a birthday attack to replace m with a fraudulent message.
III. R can launch a birthday attack to replace m with a fraudulent message.

Which of the following are possible security violations?
A
I and II only
B
I only
C
II only
D
II and III only
2

GATE CSE 2016 Set 2

MCQ (Single Correct Answer)
Anarkali digitally signs a message and sends it to Salim. Verification of the signature by Salim requires
A
Anarkali's public key
B
Salim's public key
C
Salim's private key
D
Anarkali's private key
3

GATE CSE 2015 Set 1

MCQ (Single Correct Answer)
Suppose that everyone in a group of N people wants to communicate secretly with the N - 1 others using symmetric key cryptographic system. The communication between any two persons should not be decodable by the others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is
A
2N
B
N(N - 1)
C
$${{N(N - 1)} \over 2}$$
D
(N - 1)2
4

GATE CSE 2014 Set 1

MCQ (Single Correct Answer)
Which one of the following are used to generate a message digest by the network security protocols?
(P) RSA
(Q) SHA-1
(R) DES
(S) MD5
A
P and R only
B
Q and R only
C
Q and S only
D
R and S only

Joint Entrance Examination

JEE Main JEE Advanced WB JEE

Graduate Aptitude Test in Engineering

GATE CSE GATE ECE GATE EE GATE ME GATE CE GATE PI GATE IN

Medical

NEET

CBSE

Class 12