QBank-cryptography and Hashing
QBank-cryptography and Hashing
Tirunelveli – 627152
Department of Computer Science and Engineering
Course Code: Cryptography and Hashing
UNIT 1: INTRODUCTION
Part A (2 marks)
Q.No Question BT Competence
Level*
1 Define Computer Security
2 What does OSI Security Architecture stand for? 1 Remember
3 Differentiate between Security Attacks and Security Services 2 Understand
4 Name three security mechanisms used in network security 1 Remember
5 Define Symmetric Cipher Model. 2 Understand
6 Differentiate between Groups, Rings. 2 Understand
7 What is the role of a model in network security? 2 Understand
8 What are Substitution Techniques in classical encryption? 2 Understand
9 What is the purpose of Steganography in security? 2 Understand
10 Define Number Theory and its role in cryptography 2 Understand
11 How does divisibility play a role in cryptography 2 Understand
12 How are classical encryption techniques different from modern ones? 3 Analyze
13 Define Euclidean Algorithm 2 Understand
14 Write down the example of a Transposition Technique 3 Apply
15 Define Modular Arithmetic 1 Remember
Part B (13 marks)
1 Explain about OSI Security Architecture 2 Understand
2 Difference between Active and Passive attack. 2 Understand
Analyze the role of Security Services in enhancing the overall security 3 Analyze
3
posture of a computer system
4 Explain the Symmetric Cipher Model 2 Understand
Evaluate the historical significance and cryptographic strength of Rotor 5 Evaluate
5
Machines
Evaluate the effectiveness of various Security Mechanisms in network 5 Evaluate
6
security
Discuss the mathematical foundations of groups, rings, and fields in 1 Analyze
7
cryptography.
Discuss the properties and applications of finite fields in cryptographic 2 Understand
8
protocols.
Part C(15 marks)
1 Explain about OSI Security Architecture 2 Understand
Evaluate the effectiveness of various Security Mechanisms in network 5 Evaluate
2
security
UNIT 2: MODERN SYMMETRIC CIPHERS
Part A (2 marks)
Q.No Question BT Competence
Level*
1 Define block ciphers. 1 Remember
2 Define of key size in block ciphers. 1 Remember
3 Difference between the strength and weaknesses of DES. 2 Understand
4 Define the basic principles of block ciphers. 2 Understand
5 Define differential cryptanalysis. 2 Understand
6 Short notes of linear cryptanalysis. 2 Understand
7 Define key length used in DES. 1 Remember
8 Define diffusion in block cipher design. 1 Remember
9 Define avalanche effect in the context of block ciphers. 2 Understand
10 List the key features of AES. 1 Remember
11 Short notes on Advanced Encryption Standard (AES). 2 Understand
12 Define stream ciphers. 1 Remember
13 Differences between block ciphers and stream ciphers. 2 Understand
14 Define introduce RC4. 2 Understand
15 List out the key generation process in RC4. 1 Remember
PART-B (13 Mark question)
1 Discuss the structure and components of block ciphers. 1 Remember
2 Analyze the role of key expansion in block cipher design. 3 Analyze
3 Evaluate the security of DES in modern contexts. 5 Evaluate
Explore methods to enhance the strength of DES or transition to more 1 Remember
4
secure alternatives.
Evaluate the security implications of using specific modes in various 3 Evaluate
5
scenarios.
6 Discuss the advantages and disadvantages of stream ciphers. 2 Understand
Analyze the practical implications of using RC4 in cryptographic 3 Analyze
7
applications.
PART-C (15 Mark question)
1 Analyze the role of key expansion in block cipher design. 3 Analyze
Evaluate the security implications of using specific modes in various 5 Evaluate
2
scenarios.
UNIT-3 : ASYMMETRIC CIPHERS
PART-A(2 Marks)
Q.No Question BT
Competence
Level*
1 Define prime numbers. 1 Remember
2 Define State Fermat’s theorem. 1 Remember
3 Short notes on Eulers theorem. 1 Remember
4 Define the significance of primality testing. 2 Understand
5 List some primality testing algorithms. 1 Remember
6 Short notes onState the Chinese Remainder Theorem. 2 Understand
7 Write down the importance of discrete logarithms in cryptography. 1 Remember
8 Define public-key cryptosystems. 2 Understand
9 Write down the concept of asymmetric key pairs. 1 Remember
10 Define the role of prime numbers in RSA. 2 Understand
11 Define the Diffie-Hellman key exchange. 2 Understand
12 Short notes on the role of prime numbers in RSA. 1 Remember
13 Define ElGamal cryptosystem. 2 Understand
14 Write down the advantages of using elliptic curves in cryptography. 1 Remember
15 Define elliptic curve cryptography. 2 Understand
Part-B(13 Marks)
1 Discuss the role of prime numbers in various cryptographic algorithms. 2 Understand
2 Derive and explains theorem in the context of modular arithmetic. 1 Remember
3 Discuss the principles of primality testing algorithms. 2 Understand
Discuss practical applications and limitations of the Chinese Remainder 2 Understand
4
Theorem in cryptographic protocols.
5 Analyze the role of discrete logarithms in public-key cryptography. 3 Analyze
6 Discuss the principles and advantages of public-key cryptosystems. 2 Understand
Discuss the mathematical foundations and operations in elliptic curve 1 Remember
7
arithmetic.
Part-C(15 Marks)
1 Discuss the role of prime numbers in various cryptographic algorithms. 2 Understand
Discuss the mathematical foundations and operations in elliptic curve 1 Remember
2
arithmetic.
UNIT 4: HASH FUNCTION
PART-A (2 Marks)
Q.No Question BT
Competence
Level*
1 Define Block Cipher-Based Hash Function Structure 1 Remember
2 DefineCollision Prevention 2 Understand
3 Write down the Applications of Block Cipher-Based Hash Functions 1 Remember
4 Short notes onSecurity in Hash Functions features 2 Understand
5 Define Pre-image Resistance 2 Understand
6 Define Message Digest in Hashing 1 Remember
7 Definition of Non-Block Cipher-Based Hash Function 2 Understand
8 Design Principles in Non-Block Cipher-Based Hash Functions 2 Understand
9 Define Collision Resistance advantage 1 Remember
10 Cryptographic Hash Functions vs. Non-Cryptographic Hash Functions 1 Remember
11 What is Hash Functions in Password Security 1 Remember
12 Short notes Birthday Attack on Hash Functions 2 Understand
14 Define Rainbow Table Attack on Hash Functions 1 Remember
15 Write down the Role of Compression Function in Hash Functions 1 Remember
PART-B(13 Marks)
Briefly explain about the Applications and Challenges in Block Cipher- 1 Remember
1
Based Hash Functions
2 Discuss about the Cryptanalysis of Hash Functions 2 Understand
3 Explain about the Hash Function in Data Integrity Verification 2 Understand
4 Briefly explain about theDesign Principles in Hash Functions 1 Remember
5 Explain about the Role of Compression Function in Hash Functions 2 Understand
Briefly explain about Applications of Non-Block Cipher-Based Hash 2 Understand
6
Functions
7 Write down the Role of Nonces in Hash Function Security 1 Remember
Cryptanalysis and Countermeasures for Non-Block Cipher-Based Hash 2 Understand
8
Function
PART-C (15 Marks)
Briefly explain about the Applications and Challenges in Block Cipher- 1 Remember
1
Based Hash Functions
Cryptanalysis and Countermeasures for Non-Block Cipher-Based Hash 2 Understand
2
Function
UNIT 5: CONSTRUCTION
PART-A (2 Marks)
Q.No Question BT
Competence
Level*
1 Define Security in Hash Functions 1 Remember
Difference Strong One-Way Permutation ,Universal One-Way Hash 2 Understand
2
Function
3 Define Universal One-Way Hash Function 2 Understand
4 Define Cryptographic Primitives 2 Understand
5 Define Cryptographic Construction Applications 1 Remember
6 Short notes on Design Principles in Theoretic Construction 2 Understand
7 Define Random Bit Generation for Encryption 1 Remember
8 Write down the Advantages of Pseudo-Random Bit Generation 1 Remember
9 Short notes on Security Implications of Construction Choices 2 Understand
10 Define the Applicability of Theoretic Construction 1 Remember
11 Write down the Use of Hard Bits in Cryptography 2 Understand
12 Define Pseudo-Random Bit Generation Methods 1 Remember
13 Short notes on Theoretic Construction 2 Understand
14 Short notes onHard Bit and Pseudo-Random Bit Generation 2 Understand
15 Define Cryptographic Construction in a Real-World System 1 Remember
PART-B (13 Marks)
1 Briefly explain about the Theoretic Construction of a Hash Function 2 Understand
2 Discuss about the Pseudo-Random Bit Generation in Practice 2 Understand
3 Explain about the Construction of a Secure One-Way Permutatio 1 Remember
Briefly explain about the Universal One-Way Hash Function (UOWHF) 2 Understand
4
Application
5 Explain about the Theoretical Basis of Cryptographic Constructions 2 Understand
6 Discuss about the Efficiency Analysis of Cryptographic Constructions 1 Remember
7 Explain about the Cryptographic Construction in a Real-World System 1 Remember
PART-C (15 Marks)
Briefly explain about the Universal One-Way Hash Function (UOWHF) 2 Understand
1
Application
2 Explain about the Cryptographic Construction in a Real-World System 1 Remember