1
GATE CSE 2017 Set 1
MCQ (Single Correct Answer)
+1
-0.3
A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place.

I. S can launch a birthday attack to replace m with a fraudulent message.
II. A third party attacker can launch a birthday attack to replace m with a fraudulent message.
III. R can launch a birthday attack to replace m with a fraudulent message.

Which of the following are possible security violations?
A
I and II only
B
I only
C
II only
D
II and III only
2
GATE CSE 2016 Set 2
MCQ (Single Correct Answer)
+1
-0.3
Anarkali digitally signs a message and sends it to Salim. Verification of the signature by Salim requires
A
Anarkali's public key
B
Salim's public key
C
Salim's private key
D
Anarkali's private key
3
GATE CSE 2015 Set 1
MCQ (Single Correct Answer)
+1
-0.3
Suppose that everyone in a group of N people wants to communicate secretly with the N - 1 others using symmetric key cryptographic system. The communication between any two persons should not be decodable by the others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is
A
2N
B
N(N - 1)
C
$${{N(N - 1)} \over 2}$$
D
(N - 1)2
4
GATE CSE 2014 Set 1
MCQ (Single Correct Answer)
+1
-0.3
Which one of the following are used to generate a message digest by the network security protocols?
(P) RSA
(Q) SHA-1
(R) DES
(S) MD5
A
P and R only
B
Q and R only
C
Q and S only
D
R and S only
GATE CSE Subjects
Software Engineering
Web Technologies
EXAM MAP
Medical
NEET
Graduate Aptitude Test in Engineering
GATE CSEGATE ECEGATE EEGATE MEGATE CEGATE PIGATE IN
CBSE
Class 12