Skip to content
Early access — you're among the first to try PYQLabs. Share feedback

Network Security

GATE CSE & IT · 14 questions across 12 years (2004-2019) · 30% recurrence rate

Recurrence sparkline

20042019
200420122019

Difficulty mix

easy 71%
med 29%

Question types

MCQ11
STMT2
NAT1

All 14 questions on Network Security

2019 PYQ

In an RSA cryptosystem, the value of the public modulus parameter n is 3007. If it is also known that $$\varphi $$(n) = 2880, where $$\varphi $$() denotes Euler's Totient Function, then the prime factor of n which is gre...

Med
2017 PYQ

A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place. I. S can launch a birthday attack to rep...

Med
2016 PYQ

Consider that B wants to send a message m that is digitally signed to A. Let the pair of private and public keys for A and B be denoted by $$K_x^ - $$ and $$K_x^ + $$ for x = A, B, respectively. Let K x (m) represent the...

Easy
2016 PYQ

Anarkali digitally signs a message and sends it to Salim. Verification of the signature by Salim requires

Easy
2015 PYQ

Suppose that everyone in a group of N people wants to communicate secretly with the N - 1 others using symmetric key cryptographic system. The communication between any two persons should not be decodable by the others i...

Easy
2014 PYQ

Which one of the following are used to generate a message digest by the network security protocols? (P) RSA (Q) SHA-1 (R) DES (S) MD5

Easy
2013 PYQ

Using public key cryptography, X adds a digital signature σ to message M, encrypts, and sends it to Y, where it is decrypted. Which one of the following sequences of keys is used for the operations?

Med
2011 PYQ

A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT

Med
2009 PYQ

In the RSA public key cryptosystem, the private and public keys are (e, n) and (d, n) respectively, where n = p$$ \times $$q and p and q are large primes. Besides, n is public and p and q are private. Let M be an integer...

Easy
2008 PYQ

The total number of keys required for a set of n individuals to be able to communicate with each other using secret key and public key crypto-systems, respectively are:

Easy
2007 PYQ

Consider the following two statements: i. A hash function (these are often used for computing digital signatures) is an injective function. ii. encryption technique such as DES performs a permutation on the elements of i...

Easy
2007 PYQ

Consider the following two statements: i. A hash function (these are often used for computing digital signatures) is an injective function. ii. encryption technique such as DES performs a permutation on the elements of i...

Easy
2005 PYQ

Suppose that two parties A and B wish to setup a common secret key (D - H key) between themselves using the Diffie-Hellman key exchange technique. They agree on 7 as the modulus and 3 as the primitive root. Party A choos...

Easy
2004 PYQ

A sender is employing public key Cryptography to send a secret message to a receiver. Which one of the following statement is true?

Easy