Computer Sciences > Gate 2017 Set-1 > Network Security
A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place.

(I) S can launch a birthday attack to replace m with a fraudulent message.
(II) A third party attacker can launch a birthday attack to replace m with a fraudulent message.
(III) R can launch a birthday attack to replace m with a fraudulent message.
A
(I) only
B
(II) only
C
(I) and (II) only
D
(II) and (III) only

Correct : a

Similar Questions

An IP machine Q has a path to another IP machine H via three IP routers R1, R2, and R3. Q-R1-R2-R3-H H acts as an HTTP server, and Q connects to H via HTTP an...
#1259 MCQ
An IP machine Q has a path to another IP machine H via three IP routers R1, R2, and R3. Q-R1-R2-R3-H H acts as an HTTP server, and Q connects to H via HTTP an...
#1259 MCQ
An IP machine Q has a path to another IP machine H via three IP routers R1, R2, and R3. Q-R1-R2-R3-H H acts as an HTTP server, and Q connects to H via HTTP an...
#1259 MCQ

Related Topics

No tags found

Unique Visitor Count

Total Unique Visitors

Loading......