This is a computer science engineering quiz on cryptography and network security, which includes questions on Cryptography Overview, TCP/IP and Communication Networks.
Find the number of addresses in a range if the first address is 146.102.29.0 and last address is 146.102.32.255.
What is the error (if any) in the following representation – 75.45.301.14?
Convert the following dotted-decimal notation to binary notation – 111.56.45.78
What is the error (if any) in the following representation – 111.56.045.78?
Convert the following binary notation to dotted-decimal notation – 10000001 00001011 00001011 11101111
In the elliptic curve group defined by y2= x3- 17x + 16 over real numbers, what is P + Q if P = (0,-4) and Q = (1, 0)?
Bob selects E67(2, 3) as the elliptic curve over GF(p). He selects e1 = (2, 22) and d = 4. Then he calculates e2 = d × e1 and the publicly announces the tuple (E, e1, e2). Now, Alice wants to send the plaintext P = (24, 26) to Bob and she selects r = 2. What are C1 and C2?
For the point P (7, 0) defined in the curve E13(1, 1). What is –P?
Consider knapsack that weighs 23 that has been made the weights of the superincreasing series {1, 2, 4, 9, 20, and 38}. Find the ‘n’.
For 1000 nodes in IP level, how many keys would be required?
Which among the following values: 17, 20, 38, and 50, does not have primitive roots in the group G =
The plaintext message consist of single letters with 5-bit numerical equivalents from (00000)2 to (11001)2. The secret deciphering key is the superincreasing 5-tuple (2, 3, 7, 15, 31), m = 61 and a = 17. Find the ciphertext for the message “WHY”.
‘Jitter’ refers to-
Errorless delivery
Variation in the packet arrival time
Timely delivery of message
None of the mentioned
“Meet in the middle attack” is an attack-
Where the timing required for the attack via brute force is drastically reduced
Where the adversary uses 2 or more machines to decrypt thus trying to reduce the time
Where messages are intercepted and then either relayed or substituted with another message
Where cryptanalysis takes lesser time than the brute force decryption
Find the order of group G= <Z7*, x>?
6
4
3
5