logo

Crowdly

Cryptography and Network Security(BCSE309L)

Looking for Cryptography and Network Security(BCSE309L) test answers and solutions? Browse our comprehensive collection of verified answers for Cryptography and Network Security(BCSE309L) at lms.vit.ac.in.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

Find the common shared secret key using Diffie-Hellman Key exchange algorithm.  Assume that there are 3 users with the private key values of 3, 2 and 4 respectively. The prime number and its primitive roots are 11 and 2.

View this question

In RSA, Find the value of d, given the public key of the user is (11, 77)

View this question

__________ technique is suitable for ensuring both data integrity and

authenticity.

0%
0%
50%
50%
View this question

Hash function uses a secret key for generating hash values

View this question

In

RSA, the value of ‘e’ is selected such that it lies between 0 and Ф

No

and it is

relatively prime to Ф

No.

View this question

In ElGammal Digital Signature, the private key of the receiver is used for signing 

View this question

what are all the approaches to compromise RSA algorithm?

0%
100%
100%
100%
View this question

When

a hash function is used to provide message authentication, the hash function

value is referred to as

0%
100%
0%
0%
View this question

Message authentication code is a 

0%
0%
100%
0%
View this question

Statement 1: The point (6,3) lie on the Elliptic Curve E23(1,1).

Statement 2: The point (5,4) lie on the Elliptic Curve E23(1,1).

0%
50%
0%
50%
View this question

Want instant access to all verified answers on lms.vit.ac.in?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!