Question
a.
Diffie-HEllman key exchange
b.
RSA key exchange
c.
Arithmetic key exchange
d.
FSM method
Posted under Discrete Mathematics
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Which of the following methods uses the concept that exponentiation is computationally inexpensive in the finite field?
Similar Questions
Discover Related MCQs
Q. If there is a unique prime number p₁ then a finite field F has the property of ______________
View solution
Q. Evaluate the expression 6359 mod 320.
View solution
Q. The time complexity to perform the modular exponentiation of a ≡ cᵍ (mod m).
View solution
Q. According to congruence relation, find the remainder of 56 mod 24.
View solution
Q. In cryptography system, the value of z in x ≡ zᵉ (mod m) should be at least ______
View solution
Q. Determine the value of x, where y = 7, e = 12 and n = 566 using modular exponentiation method (x ≡ yᵉ (mod n)).
View solution
Q. How many bytes of the secret key is generated using Diffie-Hellman encryption/decryption scheme?
View solution
Q. In which of the following systems, encryption slower than decryption?
View solution
Q. If there are 2⁵⁶ cipher texts per plain text and a total of 2¹⁸ plaintexts of length 18 exists. Then determine the number of distinct ciphertexts?
View solution
Q. TEA cipher uses which of the following structure?
View solution
Q. Let A’s public key is n=6, 736, 180, 7817, 961, 456, 267 and e = 5 and B sends the ciphertext. c = 456, 871, 122, 391, 882, 538 to A. Determine B’s message in numeric format?
View solution
Q. In encryption, which of the following is the best text encoding technique?
View solution
Q. _______ are used as the base of the Public Key Infrastructure.
View solution
Q. The default key size of RC2 Feistel cipher is _______
View solution
Q. How many combinations of keys can be constructed from a 72 ciphertext stream cipher?
View solution
Q. What is the block size of RC6 Feistel block cipher?
View solution
Q. Suppose that there are two primes, p₁ = 229 and p₂ = 61. Find the value of z and Φ.
View solution
Q. ________ can decrypt traffic to make it available to all other network security functions such as web proxies.
View solution
Q. The ROT13 caesar cipher system has an offset of ___________
View solution
Q. In a public key system, the cipher text received is C = 10 if RSA encryption used with a public key(e = 11, n = 77) to deduce the plain text. Determine the value of ϕ(n)?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Discrete Mathematics? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!