Skip to content
Early access — you're among the first to try PYQLabs. Share feedback
Concept drill

cryptography

GATE CSE & IT · Number Theory & Algorithms · 2004-2019

10
PYQs
90%
keyed
0
elite explanations
8
years appeared

Study anchor

Forouzan — Data Communications and Networking

Layered models, IP, routing, TCP, data link protocols

Practice action

Start latest PYQ

PYQs in this concept

All concepts →
2019 PYQ

In an RSA cryptosystem, the value of the public modulus parameter n is 3007. If it is also known that $$\varphi $$(n) = 2880, where $$\varphi $$() denotes Euler's Totient Function,...

mediumbasic explanation
2016 PYQ

Consider that B wants to send a message m that is digitally signed to A. Let the pair of private and public keys for A and B be denoted by $$K_x^ - $$ and $$K_x^ + $$ for x = A, B,...

easyanswer key
2015 PYQ

Suppose that everyone in a group of N people wants to communicate secretly with the N - 1 others using symmetric key cryptographic system. The communication between any two persons...

easyanswer key
2014 PYQ

Which one of the following are used to generate a message digest by the network security protocols? (P) RSA (Q) SHA-1 (R) DES (S) MD5

easyanswer key
2008 PYQ

The total number of keys required for a set of n individuals to be able to communicate with each other using secret key and public key crypto-systems, respectively are:

easyanswer key
2007 PYQ

Exponentiation is a heavily used operation in public key cryptography. Which of the following options is the tightest upper bound on the number of multiplications required to compu...

easyanswer key
2007 PYQ

Consider the following two statements: i. A hash function (these are often used for computing digital signatures) is an injective function. ii. encryption technique such as DES per...

easyanswer key
2007 PYQ

Consider the following two statements: i. A hash function (these are often used for computing digital signatures) is an injective function. ii. encryption technique such as DES per...

easyanswer key
2005 PYQ

Suppose that two parties A and B wish to setup a common secret key (D - H key) between themselves using the Diffie-Hellman key exchange technique. They agree on 7 as the modulus an...

easyanswer key
2004 PYQ

A sender is employing public key Cryptography to send a secret message to a receiver. Which one of the following statement is true?

easyanswer key