Question
a.
3
b.
12
c.
21
d.
42
Posted under Discrete Mathematics
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. The lcm of 3 and 21 is ________ if gcd(3,21)=3.
Similar Questions
Discover Related MCQs
Q. The least common multiple of 41.42 and 42.41 is ____________
View solution
Q. If the multiplicative inverse of “53 modulo 21” exists, then which of the following is true?
View solution
Q. A multiplicative monoid defines the property of exponentiation with ________
View solution
Q. Which of the following algorithms has better computational complexity than standard division algorithms?
View solution
Q. Which of the following methods uses the concept that exponentiation is computationally inexpensive in the finite field?
View solution
Q. If there is a unique prime number p₁ then a finite field F has the property of ______________
View solution
Q. Evaluate the expression 6359 mod 320.
View solution
Q. The time complexity to perform the modular exponentiation of a ≡ cᵍ (mod m).
View solution
Q. According to congruence relation, find the remainder of 56 mod 24.
View solution
Q. In cryptography system, the value of z in x ≡ zᵉ (mod m) should be at least ______
View solution
Q. Determine the value of x, where y = 7, e = 12 and n = 566 using modular exponentiation method (x ≡ yᵉ (mod n)).
View solution
Q. How many bytes of the secret key is generated using Diffie-Hellman encryption/decryption scheme?
View solution
Q. In which of the following systems, encryption slower than decryption?
View solution
Q. If there are 2⁵⁶ cipher texts per plain text and a total of 2¹⁸ plaintexts of length 18 exists. Then determine the number of distinct ciphertexts?
View solution
Q. TEA cipher uses which of the following structure?
View solution
Q. Let A’s public key is n=6, 736, 180, 7817, 961, 456, 267 and e = 5 and B sends the ciphertext. c = 456, 871, 122, 391, 882, 538 to A. Determine B’s message in numeric format?
View solution
Q. In encryption, which of the following is the best text encoding technique?
View solution
Q. _______ are used as the base of the Public Key Infrastructure.
View solution
Q. The default key size of RC2 Feistel cipher is _______
View solution
Q. How many combinations of keys can be constructed from a 72 ciphertext stream cipher?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Discrete Mathematics? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!