Computer Networks - Computer Networks Section 1

61. Suppose that (G, +) and (H, .) are abelian groups. A pairing is a ______ mapping e: G x G → that e(ag1, bg2) = ________ for all g1, g2 ∈ G and for all integers a, b.

Cancel reply

Your email address will not be published. Required fields are marked *


Cancel reply

Your email address will not be published. Required fields are marked *


62. Input block size of SHA-1 is

Cancel reply

Your email address will not be published. Required fields are marked *


Cancel reply

Your email address will not be published. Required fields are marked *


63. Let P, C, K denote plaintext space, ciphertext space and key space respectively. In Shift Cipher P = C = K = Z26. For 0 ≤ k ≤ 25 encryption function ek is defined by ek(x) = ______ mod 26 and decrypt fuction dk is defined by dk(x) = ____ mod 26.

Cancel reply

Your email address will not be published. Required fields are marked *


Cancel reply

Your email address will not be published. Required fields are marked *


64. In Caesar Cipher encryption function ek is defined by ek(x) = ______ mod 26

Cancel reply

Your email address will not be published. Required fields are marked *


Cancel reply

Your email address will not be published. Required fields are marked *


65. What is the ciphertext for the plaintext "CRYPTOGRAPHY" using Caesar Cipher?

Cancel reply

Your email address will not be published. Required fields are marked *


Cancel reply

Your email address will not be published. Required fields are marked *