Skip to main navigationSkip to main contentSkip to footer
Wiki Cram
  • Home
  • Blog
Wiki Cram

Author: Anonymous (page 38,344)

[128^128 mod 7]? Alternatively, what is the remainder when 1…

Posted on: April 30, 2025 Last updated on: April 30, 2025 Written by: Anonymous
? Alternatively, what is the remainder when 128 raised to 128 is divided by 7?
Continue reading “? Alternatively, what is the remainder when 1…”…

Which of the following BEST describes the security offered b…

Posted on: April 30, 2025 Last updated on: April 30, 2025 Written by: Anonymous
Which of the following BEST describes the security offered by the Diffie-Hellman key-exchange protocol (assuming the DDH problem is hard)?
Continue reading “Which of the following BEST describes the security offered b…”…

Define the generator G by G(x) = x | x. (G maps inputs of le…

Posted on: April 30, 2025 Last updated on: April 30, 2025 Written by: Anonymous
Define the generator G by G(x) = x | x. (G maps inputs of length n to outputs of length 2n). Which of the following algorithms A distinguishes the output of G from uniform?
Continue reading “Define the generator G by G(x) = x | x. (G maps inputs of le…”…

Which of the following is a drawback of the private-key sett…

Posted on: April 30, 2025 Last updated on: April 30, 2025 Written by: Anonymous
Which of the following is a drawback of the private-key setting that is NOT addressed by the public-key setting?
Continue reading “Which of the following is a drawback of the private-key sett…”…

What is the size of key space |K| for a shift cipher, consid…

Posted on: April 30, 2025 Last updated on: April 30, 2025 Written by: Anonymous
What is the size of key space |K| for a shift cipher, considering the message space as English alphabets, and encryption algorithm as Enc​(m)=(m+shift)mod 26?
Continue reading “What is the size of key space |K| for a shift cipher, consid…”…

If the message “cryptoisfun” is encrypted with the shift cip…

Posted on: April 30, 2025 Last updated on: October 29, 2025 Written by: Anonymous
If the message “cryptoisfun” is encrypted with the shift cipher and key 25. What is the resulting ciphertext?
Continue reading “If the message “cryptoisfun” is encrypted with the shift cip…”…

Say G is in the subgroup Z*11, generated by g = 4. Let’s say…

Posted on: April 30, 2025 Last updated on: April 30, 2025 Written by: Anonymous
Say G is in the subgroup Z*11, generated by g = 4. Let’s say, the group has order 5.  The public key contains h = 3. What is encryption of the message m = 5, using the secret exponent y = 3?
Continue reading “Say G is in the subgroup Z*11, generated by g = 4. Let’s say…”…

What is 7th root of 2 modulo 33? (Note that ϕ(33) = 20, and…

Posted on: April 30, 2025 Last updated on: April 30, 2025 Written by: Anonymous
What is 7th root of 2 modulo 33? (Note that ϕ(33) = 20, and 3 . 7 = 1 mod 20)
Continue reading “What is 7th root of 2 modulo 33? (Note that ϕ(33) = 20, and…”…

Which of the following is the most appropriate primitive for…

Posted on: April 30, 2025 Last updated on: April 30, 2025 Written by: Anonymous
Which of the following is the most appropriate primitive for achieving message integrity between two users sharing a key?
Continue reading “Which of the following is the most appropriate primitive for…”…

3-1 mod 7 = ? Alternatively, what is the inverse of 3 mod 7…

Posted on: April 30, 2025 Last updated on: October 29, 2025 Written by: Anonymous
3-1 mod 7 = ? Alternatively, what is the inverse of 3 mod 7 on multiplication?
Continue reading “3-1 mod 7 = ? Alternatively, what is the inverse of 3 mod 7…”…
« Previous page 1 … 38,342 38,343 38,344 38,345 38,346 … 85,419 Next page »
Powered by Studyeffect
  • Privacy Policy
  • Terms of Service
Copyright © 2026 WIKI CRAM — Powered by NanoSpace