logo

Crowdly

Information and System Security(SWE3002)

Looking for Information and System Security(SWE3002) test answers and solutions? Browse our comprehensive collection of verified answers for Information and System Security(SWE3002) at lms.vit.ac.in.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

In the DES algorithm the round key is __________ bit and the round input from plaintext is ____________bits.
0%
100%
0%
0%
View this question
The Diffie Hellman key exchange protocol is vulnerable Man-in-middle attack because
100%
0%
0%
0%
View this question
Which algorithm can be used for creating a digital signature?
0%
0%
0%
100%
View this question
ElGamal encryption with a prime p=17, generator g=3, and public key for private key x=4. Calculate h.
0%
100%
0%
0%
View this question
Which serves as additive identity in ECC algorithm?
100%
0%
0%
0%
View this question
A cryptographic hash function must be:
0%
0%
100%
0%
View this question
Kerberos protocol is primarily used for:
0%
0%
0%
100%
View this question
For 1000 nodes in IP level, how many keys would be required?
0%
100%
0%
0%
View this question
What is the order of 2 in mod 5?
0%
0%
100%
0%
View this question
In homomorphic encryption, computations can be performed on:
0%
0%
100%
0%
View this question

Want instant access to all verified answers on lms.vit.ac.in?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!