HAMRO
CSIT
Entrance
Take Free Test
MCQ Questions
Colleges
Semester
First Semester
Second Semester
Third Semester
Fourth Semester
Fifth Semester
Sixth Semester
Seventh Semester
Eight Semester
Questions
Subscription
New
Notices
Articles
Help
Ask Question
Application (
2.9.1
)
Contribute
Contact Us
Account
Sign In
Create Account
Questions
Ask Any Question From TU CSIT Syllabus?
Search
Search
Semester
All Semester
First Semester
Second Semester
Third Semester
Fourth Semester
Fifth Semester
Sixth Semester
Seventh Semester
Eight Semester
Subject
All Subjects
Eight Semester
Fifth Semester
First Semester
Fourth Semester
Second Semester
Seventh Semester
Sixth Semester
Third Semester
Answer
All
Has Answer
Not Answer
Order
Oldest
Newest
Search
Write down any two limitations of MAC. What do policy and mechanism mean in cryptography? Describe with a scenario.
Answered
Cryptography
Asked on 2076 Exam
What is the role of the prime number in the Euler totient Function? Find the GCD of 12 and 16 using the Euclidean algorithm.
Answered
Cryptography
Asked on 2076 Exam
Explain the procedure of mix column transformation in AES with an example.
Answered
Cryptography
Asked on 2076 Exam
How does the nature of worms differ from viruses? Define PKI with its architecture model.
Answered
Cryptography
Asked on 2076 Exam
What is the task of a firewall? List the elements of X.509.
Answered
Cryptography
Asked on 2076 Exam
Define digital signature. Describe the approaches of DSS.
Answered
Cryptography
Asked on 2076 Exam
Distinguish between stream cipher and block cipher. Encrypt the message WE ARE IN SAME RACE UNTILL OVER LIVE END using Rail fence cipher using 4 as a number of rails.
Answered
Cryptography
Asked on 2076 Exam
Define discrete logarithm. Explain the procedure of sharing the secret key in Diffie Hellman.
Answered
Cryptography
Asked on 2076 Exam
Compare the SHA parameters between SHA-1 and SHA-2 families. Decrypt the cipher text DRJI with the key \(\begin{pmatrix}7 & 8\\ 11 & 11\end{pmatrix}\) using the Hill cipher.
Answered
Cryptography
Asked on 2076 Exam
State Fermat’s theorem with an example. Given the prime number p=29 and its primitive root g=8, private key sender with X=9 and random integer K=11, encrypt the message m=13 using ElGamal cryptosystem.
Answered
Cryptography
Asked on 2076 Exam
Page navigation
«
« First
Page
102
Page
103
Current Page
104
Page
105
Page
106
Last »
»
Question's Answer
Solution
Share
Share this link via
Or copy link
Copy
HAMROCSIT.COM