network security
GATE CSE & IT · Network Security · 2005-2017
Study anchor
Forouzan — Data Communications and Networking
Layered models, IP, routing, TCP, data link protocols
Practice action
Start latest PYQPYQs in this concept
All concepts →A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place....
Anarkali digitally signs a message and sends it to Salim. Verification of the signature by Salim requires
Which one of the following are used to generate a message digest by the network security protocols? (P) RSA (Q) SHA-1 (R) DES (S) MD5
Using public key cryptography, X adds a digital signature σ to message M, encrypts, and sends it to Y, where it is decrypted. Which one of the following sequences of keys is used f...
Suppose that two parties A and B wish to setup a common secret key (D - H key) between themselves using the Diffie-Hellman key exchange technique. They agree on 7 as the modulus an...