adplus-dvertising
frame-decoration

Question

Suppose that everyone in a group of N people wants to communicate secretly with (N−1) other people using symmetric key cryptographic system. The communication between any two persons should not be decodable by the others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is

a.

N(N−1)

b.

N(N−1)/2

c.

2N

d.

(N−1)^2

Answer: (b).N(N−1)/2

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Suppose that everyone in a group of N people wants to communicate secretly with (N−1) other people using symmetric key cryptographic system. The communication between any two...

Similar Questions

Discover Related MCQs

Q. A slotted ALOHA network transmits 200-bit frames using a shared channel with a 200 Kbps bandwidth. Find the throughput of the system, if the system (all stations put together) produces 250 frames per second:

Q. The period of a signal is 100 ms. Its frequency is .............

Q. The dotted-decimal notation of the following IPV4 address in binary notation is ...................

10000001 00001011 00001011 11101111

Q. Which of the following statements are true?

(a) Advanced Mobile Phone System (AMPS) is a second generation cellular phone system.
(b) IS - 95 is a second generation cellular phone system based on CDMA and DSSS.
(c) The Third generation cellular phone system will provide universal personnel communication.

Q. Match the following symmetric block ciphers with corresponding block and key sizes:

List - I
(a) DES
(b) IDEA
(c) BLOW FISH
(d) AES

List - II
(i) block size 64 and key size ranges between 32 and 448
(ii) block size 64 and key size 64
(iii) block size 128 and key sizes 128, 192, 256
(iv) block size 64 and key size 128

Code:
(a) (b) (c) (d)

Q. Which of the following statements are true?

(a) Three broad categories of Networks are
(i) Circuit Switched Networks
(ii) Packet Switched Networks
(iii) Message Switched Networks
(b) Circuit Switched Network resources need not be reserved during the set up phase.
(c) In packet switching there is no resource allocation for packets.

Q. In Challenge-Response authentication the claimant ...............

Q. Decrypt the message “WTAAD” using the Caesar Cipher with key=15.

Q. To guarantee correction of upto t errors, the minimum Hamming distance dmin in a block code must be ................

Q. Which of the following devices takes data sent from one network device and forwards it to the destination node based on MAC address?

Q. .................. do not take their decisions on measurements or estimates of the current traffic and topology.

Q. The number of bits used for addressing in Gigabit Ethernet is ...................

Q. Which of the following layer of OSI Reference model is also called end-to-end layer?

Q. The IP address ................... is used by hosts when they are being booted.

Q. Suppose we want to download text documents at the rate of 100 pages per second. Assume that a page consists of an average of 24 lines with 80 characters in each line. What is the required bit rate of the channel?

Q. Quadrature Amplitude Modulation means changing both:

Q. If a file consisting of 50,000 characters takes 40 seconds to send, then the data rate is ........................

Q. Match the following:

List - I
(a) Data link layer
(b) Network layer
(c) Transport layer
(d) Presentation layer

List - II
(i) Encryption
(ii) Connection control
(iii) Routing
(iv) Framing

Code :
(a) (b) (c) (d)

Q. The address of a class B host is to be split into subnets with a 6 - bit subnet number. What is the maximum number of subnets and maximum number of hosts in each subnet?

Q. Which of the following statements are true?

(a) The fragmentation fields in the base header section of IPv4 have moved to the fragmentation extension header in IPv6.
(b) The authentication extension header is new in IPv6.
(c) The record route option is not implemented in IPv6.