Question
a.
13969, 13680
b.
5853, 23452
c.
7793, 34565
d.
17146, 69262
Posted under Discrete Mathematics
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Suppose that there are two primes, p₁ = 229 and p₂ = 61. Find the value of z and Φ.
Similar Questions
Discover Related MCQs
Q. ________ can decrypt traffic to make it available to all other network security functions such as web proxies.
View solution
Q. The ROT13 caesar cipher system has an offset of ___________
View solution
Q. In a public key system, the cipher text received is C = 10 if RSA encryption used with a public key(e = 11, n = 77) to deduce the plain text. Determine the value of ϕ(n)?
View solution
Q. To encrypt a message _______ is used on the character’s positions.
View solution
Q. The public key of given user, in an RSA encryption system is e = 57 and n = 3901. What is the value of Euler’s totient function ϕ(n) for calculating the private key of the user?
View solution
Q. Using RSA algorithm what is the value of cipher test c if the plain text e = 7 and P = 5, q = 16 & n = 832. Determine the Euler’s totient function for the plain text?
View solution
Q. There are 67 people in a company where they are using secret key encryption and decryption system for privacy purpose. Determine the number of secret keys required for this purpose?
View solution
Q. In a transposition cipher, the plaintext is constructed by the ________ of the ciphertext.
View solution
Q. How many bits of message does the Secure Hash Algorithm produce?
View solution
Q. _______ is an example of asymmetric ciphers.
View solution
Q. There is no secret key in case of ____________
View solution
Q. Suppose in order to get a message across enemy lines, we need to choose an initial secret key say, 100110. What will be the decrypted cipher when the original message is 010010011.
View solution
Q. Electronic Code Book process is used in ________
View solution
Q. ______ uses the concept of pseudo-random sequence.
View solution
Q. How many bits are there for random bits and error detection bits in the case of DES block ciphers?
View solution
Q. What are the steps in the Feistel function?
View solution
Q. What type of algorithm does AES encryption use?
View solution
Q. What is the block size of blowfish block cipher?
View solution
Q. In which cipher each letter of the plaintext is substituted by any other letter to form the cipher message?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Discrete Mathematics? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!