100% found this document useful (2 votes)
395 views3 pages

Crypto QB Module 1, 2

This document contains a question bank on cryptography topics including classical encryption techniques, public key cryptography, and RSA. It includes questions about cryptographic concepts like plaintext, ciphertext, encryption, decryption, and cryptanalysis. It also includes questions about specific classical techniques like the Caesar cipher, polyalphabetic ciphers, the Playfair cipher, and stream vs block ciphers. For public key cryptography, it covers the RSA algorithm, Diffie-Hellman key exchange, and applications of public key systems. Many questions ask to perform encryption or decryption using RSA with given parameters or explain the mathematical foundations and workings of RSA.

Uploaded by

Nitish
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
395 views3 pages

Crypto QB Module 1, 2

This document contains a question bank on cryptography topics including classical encryption techniques, public key cryptography, and RSA. It includes questions about cryptographic concepts like plaintext, ciphertext, encryption, decryption, and cryptanalysis. It also includes questions about specific classical techniques like the Caesar cipher, polyalphabetic ciphers, the Playfair cipher, and stream vs block ciphers. For public key cryptography, it covers the RSA algorithm, Diffie-Hellman key exchange, and applications of public key systems. Many questions ask to perform encryption or decryption using RSA with given parameters or explain the mathematical foundations and workings of RSA.

Uploaded by

Nitish
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Cryptography – 18CS744

Question Bank
Module 1
1. Classical Encryption Techniques
1. What is cryptography? Define the following terminologies
2. a. Plaintext, b. Ciphertext, c. Enciphering or encryption, d. Deciphering or
decryption
3. e. Cryptanalysis
4. Explain Cryptographic Systems with different dimensions
5. What is meant by Brute force attack? Explain it with example
6. Explain the Model of Symmetric Encryption process
7. What is meant by substitution techniques? List and explain any two substitution
techniques.
8. What are the various substitution techniques used for encryption?
9. Explain Monoalphabetic cipher technique with example
10. Explain Polyalphabetic Ciphers technique with example
11. Explain the Caesar Cipher Algorithm with example.
12. Using Caesar Cipher Algorithm encrypt and decrypt the message “dcodex” key
is 3
13. List out the limitations of one time pad
14. What is the difference between monoalphabetic and polyalphabetic cipher?
15. What is Cryptanalysis?
16. Using playfair cipher algorithm encrypt the message “RNSIT” using the key
“MONARCHY “and explain?
17. Explain classical encryption techniques with Hill cipher model.
18. Describe (i) Playfair cipher (ii)Vignere cipher iii) Vernam cipher
19. Describe the working principles of simple DES.
20. Describe i) SAC ii)BIC iii)Avalanche effect
21. Explain the differences between Stream Ciphers and Block Ciphers techniques
22. Explain the process of Feistel Cipher structure for encryption and decryption
with example
23. Define the terms confusion and diffusion.
24. Explain in brief substitution and permutation.
25. Explain block cipher design principles.
Module 2
2. PUBLIC KEY CRYPTOGRAPHY
1. What are the principle elements of a public key cryptosystem?
2. What are roles of public and private key in security and authentication?
3. Explain the Public-Key Cryptosystems with neat diagram
4. Specify the applications of the public key cryptosystem?
5. Explain the Public-Key Cryptosystems for secrecy and authentications
6. Briefly explain Diffie-Hellman Key Exchange algorithm.
7. Describe the Man-in-the-Middle Attack
8. Explain the Elgamal public key Cryptosystem in detail
9. Write the difference between public key and private key crypto systems?
10. Write the formula for Encryption and Decryption in RSA.
11. Consider the RSA encryption method with p=11 and q=17 as the two primes.
Find n and Φ(n).
12. Explain about the RSA algorithm with the example as: p=11, q=5, e=3 and
PT=9.
13. Demonstrate Encryption and Decryption for the RSA algorithm parameters
p=3, q=11, e=7, d=?, M=5.
14. Explain RSA algorithm in detail, for the given values trace the sequence of
calculations in RSA. P=7, q=13, e=5, and M=10.
15. Describe the mathematical foundations of RSA algorithm. Perform encryption
and decryption for the following, p=17, q=7, e=5, n=119, message =”6”. Use
extended Euclid’s algorithm to find the private key.
16. Perform encryption & decryption using RSA algorithm for p = 17, q = 11, e =
7 and M = 88.
17. Find the secret key shared between user A & user B using Diffie Hellman
algorithm for the following. Q = 353, α (primitive root) = 3, XA = 45 & XB =
50
18. Demonstrate Encryption and Decryption for the RSA algorithm parameters
p=3, q=11, e=7, d=?, M=5
19. Explain Diffie-Hellman Key exchange algorithm in detail
20. Explain the working of RSA and choose an application of your choice for RSA
and show how encryption and decryption is carried out.

You might also like