0% found this document useful (0 votes)
44 views2 pages

Crypto Question Bank

The document contains questions from 5 sections related to cryptography and network security. The questions cover topics such as symmetric and asymmetric encryption, block cipher modes of operation, RSA and Diffie-Hellman algorithms, hash functions, digital signatures, and secure communication protocols.

Uploaded by

johnabrahim1010
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views2 pages

Crypto Question Bank

The document contains questions from 5 sections related to cryptography and network security. The questions cover topics such as symmetric and asymmetric encryption, block cipher modes of operation, RSA and Diffie-Hellman algorithms, hash functions, digital signatures, and secure communication protocols.

Uploaded by

johnabrahim1010
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Course Name: Cryptography & Network Security

PROGRAM: B.Tech Cyber Security (VI Sem)


Course Code: SOC-310

QUESTION BANK/MASTER ASSIGNMENT Dated: 22/04/2024

Q.No SECTION - A
1 Differentiate between Symmetric Encryption and Asymmetric Encryption
Illustrate the following equation using Chinese Remainder Theorem.
X = 2(Mod 3)
2
X = 3(Mod 5)
X = 2(Mod 7)
3 Discuss play fair rules and encrypt the Plain Text instruments with play fair Cipher.
Explain Euler's Totient function and Euler’s Theorem with suitable example. Also, enlist the
4
applications.
Prove that Fermat’s theorem hold for the following or not?
5 i. P=5, a=2
ii. P=6, a=2
Describe Euclid's algorithm for finding the greatest common divisor (GCD) of two integers.
6
Provide an example illustrating its usage.
7 Compare Substitution Ciphers with Transposition Ciphers.
8 Categorize the Active and Passive attacks.
9 Quote Cryptanalysis and Brute Force Attacks
10 Explain Groups, Fields and Rings.

Q.No SECTION - B
Categorized the modes of operation of Block Cipher in detail.
1

2 Discuss two practical strategies for managing public and private keys in a secure manner.
Discuss why AES eventually replaced 3DES as the preferred symmetric encryption standard
3
despite 3DES being more widely used initially.
Illustrate encryption and decryption using the RSA algorithm for the following:
4
p=17; q=31; e=7; M=2
Discuss a real-world application scenario where public key cryptography is more suitable than
5
symmetric key cryptography.
Explain the process of key generation, distribution, and storage in a cryptographic system. In your
6
view, what are the best practices should be followed to ensure secure key management?
Illustrate Diffie-Hellman Key Exchange algorithm and How does Diffie-Hellman contribute to
7
secure communication over an insecure channel?
Explain the general structure of DES and each Step for encryption in short.
8

Describe the characteristics of the Advanced Encryption Standard (AES).


9

Examine the design principles and key features of the Blowfish cipher and evaluate the suitability
10
of Blowfish for cryptographic applications.

Q.No SECTION - C
Define HMAC (Hash-based Message Authentication Code). How does HMAC enhance the
1
security of traditional MAC algorithms.
2 Explain the Schnorr signature algorithm, focusing on its advantages over other digital signature
schemes and its role in authentication protocols.
Compare MD5 and SHA algorithms. Discuss their key features, including hash size and usage in
3
cryptographic applications.
Explain the ElGamal signature scheme and its cryptographic principles. Find the cypher text for:
4
P=11, D=3, E1=2, and PT=7.
5 Discuss the role of Hash functions in Information Security.
Discuss the importance of cryptographic hash functions and digital signatures in securing modern
6
communication protocols such as TLS/SSL and HTTPS.
Discuss the principles of digital signatures and their role in ensuring message authenticity and
7
integrity.
Describe the purpose and functionality of a Message Authentication Code (MAC) in
8
cryptographic systems. How does a MAC ensure message integrity and authenticity?
Compare and contrast HMAC (Hash-based Message Authentication Code) and CMAC (Cipher-
9
based Message Authentication Code) in terms of their design and usage.
10 Discuss Public Key Cryptosystem with its four applications.

Q.No SECTION - D
1 Describe the roles and responsibilities of different types of firewalls in network security.
Consider a Scenario where you are designing a secure online payment system using the Secure
Electronic Transaction (SET) protocol. A customer wants to purchase an item from your e-
commerce website. Explain how the following information would be handled during the
2
transaction using SET:
a) Customer's credit card details
Order details (item description, price)
Discuss various threats encountered in computer systems. Differentiate among viruses, worms and
3
Trojans.
Explain the Kerberos authentication protocol. How does Kerberos facilitate secure authentication
4
and authorization in distributed computing environments?
Define an intruder in the context of network security. Also define the motivations and techniques
5
commonly employed by intruders to compromise system security?

Q.No SECTION - E
Describe the differences between symmetric and asymmetric encryption algorithms and their roles
1
in SSL/TLS.
Discuss email authentication of the source prevent email spoofing and identity fraud? Discuss
2
techniques used for email sender authentication, such as SPF, DKIM, and DMARC.
Differentiate between IP and IPv6 in terms of their security features and capabilities. Discuss how
3
IPv6 addresses security concerns present in IPv4.
Explain the Secure/Multipurpose Internet Mail Extensions (S/MIME) protocol. How does
4
S/MIME enhance email security.
5 Explain Pretty Good Privacy (PGP) and its role in securing email communication.

You might also like