Team

Team

This account on Doubtly.in is managed by the core team of Doubtly.

Some of the questions don't have answers at the moment. Please add if you know the answer. Thank you.

This account on Doubtly.in is managed by the core team of Doubtly.
Asked a question
Auto Draft
2 days ago 2
Received an upvote
2 days ago 10
Posted an answer
CSS – Cryptography & System Security IMP Questions for IA 2

Module 1 Services , Mechanism and Attack Network Security model Keyed and keyless transposition technique Numericals: Playfair (But practice all) Module 2 Block cipher modes DES and Triple DES RSA Diffie...

2 days ago 5
Posted an answer
Explain digital  signature scheme RSA. 

Digital Signature : As the name sounds are the new alternative to sign a document digitally. It ensures that the message is sent by the intended user without any tampering by any third party (attacker)....

2 days ago 5
Posted an answer
User A and B want to use RSA to communicate securely

Answer to : User A and B want to use RSA to communicate securely. A chooses public key  as (7, 119) and B chooses public key as (13, 221). Calculate their private  keys. A wishes to send message m...

2 days ago 5
Posted an answer
User A and B decide  to use Diffie-Hellman algorithm to share a key. 

Answer to : What is need of Diffie-Hellman algorithm. User A and B decide  to use Diffie-Hellman algorithm to share a key.  They choose p = 23 and g = 5 as the public parameters.  Their secret keys...

2 days ago 5
Received an upvote
2 days ago 10
Selected an answer as best
write short note on X.509  in CSS

X.509 is a digital certificate that is built on top of a widely trusted standard known as ITU or International Telecommunication Union X.509 standard, in which the format of PKI certificates is defined....

2 days ago 2
Commented on a post

Thank You @supriya

2 days ago 2
Received an upvote
2 days ago 10
Answer was selected as best
2 days ago 10
Selected an answer as best
2 days ago 2
Posted an answer
Encrypt “The key is  hidden under the door” using playfair cipher with keyword “domestic”.

Encrypt “The key is  hidden under the door” using playfair cipher with keyword “domestic”. Playfair Matrix in step 1 (draw it in step 1 only ) : D O M E S T I C A B F G H K L N P Q...

2 days ago 5
Posted an answer
Encrypt “The key is  hidden under the door” using playfair cipher with keyword “domestic”.

Playfair Matrix: D O M E S T I C A B F G H K L N P Q R U V W X Y Z Encrypted Message: CFARAEBOGCMVOSPNVTAYCFSOMWEP

2 days ago 5
Posted an answer
Describe services and mechanisms in CSS

Security services A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. These services are intended to counter...

2 days ago 5
Commented on a post

prepare flowchart like diagrams to increase the length

2 days ago 2
Posted an answer
Briefly explain database security.

Database security involves implementing measures to protect a database from unauthorized access, data corruption, and other threats. Its requirements include ensuring confidentiality, integrity, availability,...

2 days ago 5
Posted an answer
List and explain characteristics needed in secure hash function.

Properties/  characteristics  of hash functions To be a reliable cryptographic tool, the hash function should have the following charactersitcs − Pre-Image Resistance According to this feature,...

2 days ago 5
Posted an answer
d. List and explain security requirements of database.

A database is an organized collection of structured data stored electronically in a computer system. It is designed to efficiently manage, retrieve, and manipulate large volumes of data for various purposes....

2 days ago 5
Posted an answer
Enlist various functions of protocols of SSL.

Secure Socket Layer (SSL) provides security to the data that is transferred between web browser and server. SSL encrypts the link between a web server and a browser which ensures that all data passed...

2 days ago 5
Load More