Crypto QB Module 1, 2
Crypto QB Module 1, 2
Question Bank
Module 1
1. Classical Encryption Techniques
1. What is cryptography? Define the following terminologies
2. a. Plaintext, b. Ciphertext, c. Enciphering or encryption, d. Deciphering or
decryption
3. e. Cryptanalysis
4. Explain Cryptographic Systems with different dimensions
5. What is meant by Brute force attack? Explain it with example
6. Explain the Model of Symmetric Encryption process
7. What is meant by substitution techniques? List and explain any two substitution
techniques.
8. What are the various substitution techniques used for encryption?
9. Explain Monoalphabetic cipher technique with example
10. Explain Polyalphabetic Ciphers technique with example
11. Explain the Caesar Cipher Algorithm with example.
12. Using Caesar Cipher Algorithm encrypt and decrypt the message “dcodex” key
is 3
13. List out the limitations of one time pad
14. What is the difference between monoalphabetic and polyalphabetic cipher?
15. What is Cryptanalysis?
16. Using playfair cipher algorithm encrypt the message “RNSIT” using the key
“MONARCHY “and explain?
17. Explain classical encryption techniques with Hill cipher model.
18. Describe (i) Playfair cipher (ii)Vignere cipher iii) Vernam cipher
19. Describe the working principles of simple DES.
20. Describe i) SAC ii)BIC iii)Avalanche effect
21. Explain the differences between Stream Ciphers and Block Ciphers techniques
22. Explain the process of Feistel Cipher structure for encryption and decryption
with example
23. Define the terms confusion and diffusion.
24. Explain in brief substitution and permutation.
25. Explain block cipher design principles.
Module 2
2. PUBLIC KEY CRYPTOGRAPHY
1. What are the principle elements of a public key cryptosystem?
2. What are roles of public and private key in security and authentication?
3. Explain the Public-Key Cryptosystems with neat diagram
4. Specify the applications of the public key cryptosystem?
5. Explain the Public-Key Cryptosystems for secrecy and authentications
6. Briefly explain Diffie-Hellman Key Exchange algorithm.
7. Describe the Man-in-the-Middle Attack
8. Explain the Elgamal public key Cryptosystem in detail
9. Write the difference between public key and private key crypto systems?
10. Write the formula for Encryption and Decryption in RSA.
11. Consider the RSA encryption method with p=11 and q=17 as the two primes.
Find n and Φ(n).
12. Explain about the RSA algorithm with the example as: p=11, q=5, e=3 and
PT=9.
13. Demonstrate Encryption and Decryption for the RSA algorithm parameters
p=3, q=11, e=7, d=?, M=5.
14. Explain RSA algorithm in detail, for the given values trace the sequence of
calculations in RSA. P=7, q=13, e=5, and M=10.
15. Describe the mathematical foundations of RSA algorithm. Perform encryption
and decryption for the following, p=17, q=7, e=5, n=119, message =”6”. Use
extended Euclid’s algorithm to find the private key.
16. Perform encryption & decryption using RSA algorithm for p = 17, q = 11, e =
7 and M = 88.
17. Find the secret key shared between user A & user B using Diffie Hellman
algorithm for the following. Q = 353, α (primitive root) = 3, XA = 45 & XB =
50
18. Demonstrate Encryption and Decryption for the RSA algorithm parameters
p=3, q=11, e=7, d=?, M=5
19. Explain Diffie-Hellman Key exchange algorithm in detail
20. Explain the working of RSA and choose an application of your choice for RSA
and show how encryption and decryption is carried out.