# in the rsa algorithm, we select 2 random large values ‘p’ and ‘q’. which of the following is the property of ‘p’ and ‘q’?

### Mohammed

Guys, does anyone know the answer?

get in the rsa algorithm, we select 2 random large values ‘p’ and ‘q’. which of the following is the property of ‘p’ and ‘q’? from screen.

## In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the property of ‘p’ and ‘q’?

In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the property of ‘p’ and ‘q’? p and q should be divisible by Ф(n) p and q should be co-prime p and q should be prime p/q should give no remainder. Cryptography and Network Security Objective type Questions and Answers.

## Discussion Forum

Que. In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the property of ‘p’ and ‘q’?

a. p and q should be divisible by Ф(n)

b. p and q should be co-prime

c. p and q should be prime

d. p/q should give no remainder

Answer:p and q should be prime

### Confused About the Answer? Ask for Details Here

### Know Explanation? Add it Here

### Similar Questions:

For p = 11 and q = 19 and choose d=17. Apply RSA algorithm where Cipher message=80 and thus find the plain text.

USENET falls under which category of public key sharing?

Which Cryptographic system uses C1 = (e1^r) mod p and C1 = (e2^r x P) mod p at the encryption side?

In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the property of ‘p’ and ‘q’?

For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where PT message=88 and thus find the CT.

RSA is also a stream cipher like Merkel-Hellman.

In Merkle-Hellman Cryptosystem, the hard knapsack becomes the private key and the easy knapsack becomes the public key.

Sender chooses p = 107, e1 = 2, d = 67, and the random integer is r=45. Find the plaintext to be transmitted if the ciphertext is (28,9).

“Rabin Cryptosystem is a variant of the Elgamal Cryptosystem”

In Elgamal cryptosystem, given the prime p=31. Encrypt the message “HELLO”; use 00 to 25 for encoding. The value of C2 for character ‘O’ is

Using Rabin cryptosystem with p=23 and q=7, Encrypt P=24 to find ciphertext. The Cipher text is

For p = 11 and q = 19 and choose e=17. Apply RSA algorithm where message=5 and find the cipher text.

In an RSA system the public key of a given user is e = 31, n = 3599. What is the private key of this user?

Set {1, 2, 3, 9, 10, and 24} is superincreasing.

In Elgamal cryptosystem, given the prime p=31. Choose e1= first primitive root of p and d=10, calculate e2.

Suppose that plaintext message units are single letters in the usual 26-letter alphabet with A-Z corresponding to 0-25. You receive the sequence of ciphertext message units 14, 25, 89. The public key is the sequence {57, 14, 3, 24, 8} and the secret key is b = 23, m = 61.

Decipher the message. The Plain text is

Another name for Merkle-Hellman Cryptosystem is

Compute private key (d, p, q) given public key (e=23, n=233 ´ 241=56,153).

For the Knapsack: {1 6 8 15 24}, Find the cipher text value for the plain text 10011.

For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where Cipher message=11 and thus find the plain text.

## RSA Algorithm questions & answers for quizzes and worksheets

Find and create gamified quizzes, lessons, presentations, and flashcards for students, employees, and everyone else. Get started for free!

## Computers

## University

Computers University RSA Algorithm

PRETHIJA II 29 plays

## 10 Qs

Show Answers See Preview 1. Multiple-choice 30 seconds 1 pt Q.

In RSA, Ф(n) = _______ in terms of p and q.

answer choices (p)/(q) (p)(q)

**(p-1)(q-1)**

(p+1)(q+1) 2. Multiple-choice 30 seconds 1 pt Q.

RSA is named after the researchers (_____ ) who proposed it

answer choices

River, Shamir, Adleman

Rivest, Shamus, Adleman

Rivest, Shamir, Adleman

Rivest, Shamir, Adlemar

3. Multiple-choice 30 seconds 1 pt Q.

**Richard received an encrypted message sent to him from Sue. Which key should he use to decrypt the message?**

answer choices

Richard's public key

Richard's private key

Sue's public key

A. Sue's private key

4. Multiple-choice 30 seconds 1 pt Q.

In the RSA public key cryptosystem, which one of the following numbers will always be largest?

answer choices e n p q 5. Multiple-choice 30 seconds 1 pt Q.

In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the property of ‘p’ and ‘q’?

answer choices

p and q should be divisible by Ф(n)

p and q should be co-prime

p and q should be prime

p/q should give no remainder

Explore all questions with a free account

Already have an account?

## Quizzes you may like

SUPER

### 20 Qs

### Computer Architecture

### 1.9K plays

University LESSON

### 8 Qs

### Computer Mouse

### 632 plays

1st

### 10 Qs

### Keyboard

### 23K plays

3rd

### 15 Qs

### Computer Keyboard

### 158 plays

2nd SUPER

### 100 Qs

### Principles of Programming Languages

### 3.5K plays

University

### 20 Qs

### The Keyboard

### 169 plays

1st

### 40 Qs

### Data Entry and Keyboard Skills

### 261 plays

9th

### 22 Qs

### Keyboarding Vocabulary

### 23 plays

5th - 6th

## Cryptography Online Test

This set of Cryptography online test focuses on “Knapsack/ Merkle – Hellman/ RSA Cryptosystem”. 1. Find the ciphertext for the message {100110101011011} using superincreasing sequence { 1, 3, 5, 11, 35 } and private keys a = 5 and m=37. a) C = ( 33, 47, 65 ) b) C = ( 65, 33, 47 ... Read more

## Asymmetric Ciphers Questions and Answers – Knapsack/ Merkle – Hellman/ RSA Cryptosystem – II

« Prev Next »

This set of Cryptography online test focuses on “Knapsack/ Merkle – Hellman/ RSA Cryptosystem”.

1. Find the ciphertext for the message {100110101011011} using superincreasing sequence { 1, 3, 5, 11, 35 } and private keys a = 5 and m=37.

a) C = ( 33, 47, 65 )

b) C = ( 65, 33, 47 )

c) C = ( 47, 33, 65 )

d) C = ( 47, 65, 33 )

View Answer

2. Suppose that plaintext message units are single letters in the usual 26-letter alphabet with A-Z corresponding to 0-25. You receive the sequence of ciphertext message units 14, 25, 89. The public key is the sequence {57, 14, 3, 24, 8} and the secret key is b = 23, m = 61.

Decipher the message. The Plain text is

a) TIN b) INT c) KIN d) INK View Answer

3. RSA is also a stream cipher like Merkel-Hellman.

a) True b) False View Answer

Check this: Computer Science MCQs | Cyber Security MCQ

4. In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the property of ‘p’ and ‘q’?

a) p and q should be divisible by Ф(n)

b) p and q should be co-prime

c) p and q should be prime

d) p/q should give no remainder

View Answer

5. In RSA, Ф(n) = _______ in terms of p and q.

a) (p)/(q) b) (p)(q) c) (p-1)(q-1) d) (p+1)(q+1) View Answer advertisement

6. In RSA, we select a value ‘e’ such that it lies between 0 and Ф(n) and it is relatively prime to Ф(n).

a) True b) False View Answer

7. For p = 11 and q = 19 and choose e=17. Apply RSA algorithm where message=5 and find the cipher text.

a) C=80 b) C=92 c) C=56 d) C=23 View Answer advertisement

8. For p = 11 and q = 19 and choose d=17. Apply RSA algorithm where Cipher message=80 and thus find the plain text.

a) 54 b) 43 c) 5 d) 24 View Answer

9. USENET falls under which category of public key sharing?

a) Public announcement

b) Publicly available directory

c) Public-key authority

d) Public-key certificates

View Answer

Perform encryption on the following PT using RSA and find the CT.

10. p = 3; q = 11; M = 5

a) 28 b) 26 c) 18 d) 12 View Answer

11. p = 5; q = 11; M = 9

a) 43 b) 14 c) 26 d) 37 View Answer

12. p = 7; q = 11; M = 8

a) 19 b) 57 c) 76 d) 59 View Answer

13. p = 11; q = 13; M = 7

a) 84 b) 124 c) 106 d) 76 View Answer

14. p = 17; q = 31; M = 2

a) 254 b) 423 c) 128 d) 523 View Answer

15. n = 35; e = 5; C = 10. What is the plaintext (use RSA) ?

a) 3 b) 7 c) 8 d) 5 View Answer

**Sanfoundry Global Education & Learning Series – Cryptography and Network Security.**

To practice all areas of Cryptography for online test, here is complete set of 1000+ Multiple Choice Questions and Answers.

« Prev - Asymmetric Ciphers Questions and Answers – Knapsack/ Merkle – Hellman/ RSA Cryptosystem – I

» Next - Asymmetric Ciphers Questions and Answers – Elliptic Curve Arithmetic/Cryptography – I

**Related Posts:**

Buy Cryptography and Network Security Books

Practice Computer Science MCQs

Practice Cyber Security MCQ

Apply for Computer Science Internship

Buy Computer Science Books

advertisement

### Recommended Articles:

Asymmetric Ciphers Questions and Answers – Knapsack/ Merkle – Hellman/ RSA Cryptosystem – I

Asymmetric Ciphers Questions and Answers – Rabin/ Elgamal Algorithm

Asymmetric Ciphers Questions and Answers – Number Theory – V

Asymmetric Ciphers Questions and Answers – Number Theory – II

Asymmetric Ciphers Questions and Answers – Number Theory – I

Asymmetric Ciphers Questions and Answers – Number Theory – III

Asymmetric Ciphers Questions and Answers – Number Theory – IV

Asymmetric Ciphers Questions and Answers – Elliptic Curve Arithmetic/Cryptography – I

Asymmetric Ciphers Questions and Answers – Elliptic Curve Arithmetic/Cryptography – II

Discrete Mathematics Questions and Answers – Cryptography – Ciphers

advertisement

**Additional Resources:**

C++ Algorithm Library

String Programs in C++

Event Handling in Java with Examples

Visual Basic MCQ Questions

Java String Programs

**Popular Pages:**

Searching and Sorting Algorithms in C

String Programs in C

C# Programs on Functions

Automata Theory MCQ Questions

JavaScript MCQ Questions

Guys, does anyone know the answer?