Team

Team

This account on Doubtly.in is managed by the core team of Doubtly.

Some of the questions don't have answers at the moment. Please add if you know the answer. Thank you.

This account on Doubtly.in is managed by the core team of Doubtly.

Module 1 Services , Mechanism and Attack Network Security model Keyed and keyless transposition technique Numericals: Playfair (But practice all) Module 2 Block cipher modes DES and Triple DES RSA Diffie...

View Question
0 Votes

Digital Signature : As the name sounds are the new alternative to sign a document digitally. It ensures that the message is sent by the intended user without any tampering by any third party (attacker)....

View Question
0 Votes

Answer to : User A and B want to use RSA to communicate securely. A chooses public key  as (7, 119) and B chooses public key as (13, 221). Calculate their private  keys. A wishes to send message m...

View Question
0 Votes

Answer to : What is need of Diffie-Hellman algorithm. User A and B decide  to use Diffie-Hellman algorithm to share a key.  They choose p = 23 and g = 5 as the public parameters.  Their secret keys...

View Question
0 Votes

An X.509 digital certificate is a standard format for public key certificates used in various internet protocols, such as TLS/SSL for secure communication, S/MIME for secure email, and others. It contains...

View Question
0 Votes

Encrypt “The key is  hidden under the door” using playfair cipher with keyword “domestic”. Playfair Matrix in step 1 (draw it in step 1 only ) : D O M E S T I C A B F G H K L N P Q...

View Question
0 Votes Selected

Playfair Matrix: D O M E S T I C A B F G H K L N P Q R U V W X Y Z Encrypted Message: CFARAEBOGCMVOSPNVTAYCFSOMWEP

View Question
0 Votes

Security services A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. These services are intended to counter...

View Question
0 Votes

Database security involves implementing measures to protect a database from unauthorized access, data corruption, and other threats. Its requirements include ensuring confidentiality, integrity, availability,...

View Question
0 Votes

Properties/  characteristics  of hash functions To be a reliable cryptographic tool, the hash function should have the following charactersitcs − Pre-Image Resistance According to this feature,...

View Question
0 Votes
Load more answers