0% found this document useful (0 votes)
13 views

QBank-cryptography and Hashing

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

QBank-cryptography and Hashing

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

PSN COLLEGE OF ENGINEERING AND TECHNOLOGY (Autonomous)

Tirunelveli – 627152
Department of Computer Science and Engineering
Course Code: Cryptography and Hashing

UNIT 1: INTRODUCTION
Part A (2 marks)
Q.No Question BT Competence
Level*
1 Define Computer Security
2 What does OSI Security Architecture stand for? 1 Remember
3 Differentiate between Security Attacks and Security Services 2 Understand
4 Name three security mechanisms used in network security 1 Remember
5 Define Symmetric Cipher Model. 2 Understand
6 Differentiate between Groups, Rings. 2 Understand
7 What is the role of a model in network security? 2 Understand
8 What are Substitution Techniques in classical encryption? 2 Understand
9 What is the purpose of Steganography in security? 2 Understand
10 Define Number Theory and its role in cryptography 2 Understand
11 How does divisibility play a role in cryptography 2 Understand
12 How are classical encryption techniques different from modern ones? 3 Analyze
13 Define Euclidean Algorithm 2 Understand
14 Write down the example of a Transposition Technique 3 Apply
15 Define Modular Arithmetic 1 Remember
Part B (13 marks)
1 Explain about OSI Security Architecture 2 Understand
2 Difference between Active and Passive attack. 2 Understand
Analyze the role of Security Services in enhancing the overall security 3 Analyze
3
posture of a computer system
4 Explain the Symmetric Cipher Model 2 Understand
Evaluate the historical significance and cryptographic strength of Rotor 5 Evaluate
5
Machines
Evaluate the effectiveness of various Security Mechanisms in network 5 Evaluate
6
security
Discuss the mathematical foundations of groups, rings, and fields in 1 Analyze
7
cryptography.
Discuss the properties and applications of finite fields in cryptographic 2 Understand
8
protocols.
Part C(15 marks)
1 Explain about OSI Security Architecture 2 Understand
Evaluate the effectiveness of various Security Mechanisms in network 5 Evaluate
2
security
UNIT 2: MODERN SYMMETRIC CIPHERS
Part A (2 marks)
Q.No Question BT Competence
Level*
1 Define block ciphers. 1 Remember
2 Define of key size in block ciphers. 1 Remember
3 Difference between the strength and weaknesses of DES. 2 Understand
4 Define the basic principles of block ciphers. 2 Understand
5 Define differential cryptanalysis. 2 Understand
6 Short notes of linear cryptanalysis. 2 Understand
7 Define key length used in DES. 1 Remember
8 Define diffusion in block cipher design. 1 Remember
9 Define avalanche effect in the context of block ciphers. 2 Understand
10 List the key features of AES. 1 Remember
11 Short notes on Advanced Encryption Standard (AES). 2 Understand
12 Define stream ciphers. 1 Remember
13 Differences between block ciphers and stream ciphers. 2 Understand
14 Define introduce RC4. 2 Understand
15 List out the key generation process in RC4. 1 Remember
PART-B (13 Mark question)
1 Discuss the structure and components of block ciphers. 1 Remember
2 Analyze the role of key expansion in block cipher design. 3 Analyze
3 Evaluate the security of DES in modern contexts. 5 Evaluate
Explore methods to enhance the strength of DES or transition to more 1 Remember
4
secure alternatives.
Evaluate the security implications of using specific modes in various 3 Evaluate
5
scenarios.
6 Discuss the advantages and disadvantages of stream ciphers. 2 Understand
Analyze the practical implications of using RC4 in cryptographic 3 Analyze
7
applications.
PART-C (15 Mark question)
1 Analyze the role of key expansion in block cipher design. 3 Analyze
Evaluate the security implications of using specific modes in various 5 Evaluate
2
scenarios.
UNIT-3 : ASYMMETRIC CIPHERS

PART-A(2 Marks)
Q.No Question BT
Competence
Level*
1 Define prime numbers. 1 Remember
2 Define State Fermat’s theorem. 1 Remember
3 Short notes on Eulers theorem. 1 Remember
4 Define the significance of primality testing. 2 Understand
5 List some primality testing algorithms. 1 Remember
6 Short notes onState the Chinese Remainder Theorem. 2 Understand
7 Write down the importance of discrete logarithms in cryptography. 1 Remember
8 Define public-key cryptosystems. 2 Understand
9 Write down the concept of asymmetric key pairs. 1 Remember
10 Define the role of prime numbers in RSA. 2 Understand
11 Define the Diffie-Hellman key exchange. 2 Understand
12 Short notes on the role of prime numbers in RSA. 1 Remember
13 Define ElGamal cryptosystem. 2 Understand
14 Write down the advantages of using elliptic curves in cryptography. 1 Remember
15 Define elliptic curve cryptography. 2 Understand
Part-B(13 Marks)
1 Discuss the role of prime numbers in various cryptographic algorithms. 2 Understand
2 Derive and explains theorem in the context of modular arithmetic. 1 Remember
3 Discuss the principles of primality testing algorithms. 2 Understand
Discuss practical applications and limitations of the Chinese Remainder 2 Understand
4
Theorem in cryptographic protocols.
5 Analyze the role of discrete logarithms in public-key cryptography. 3 Analyze
6 Discuss the principles and advantages of public-key cryptosystems. 2 Understand
Discuss the mathematical foundations and operations in elliptic curve 1 Remember
7
arithmetic.
Part-C(15 Marks)
1 Discuss the role of prime numbers in various cryptographic algorithms. 2 Understand
Discuss the mathematical foundations and operations in elliptic curve 1 Remember
2
arithmetic.
UNIT 4: HASH FUNCTION
PART-A (2 Marks)
Q.No Question BT
Competence
Level*
1 Define Block Cipher-Based Hash Function Structure 1 Remember
2 DefineCollision Prevention 2 Understand
3 Write down the Applications of Block Cipher-Based Hash Functions 1 Remember
4 Short notes onSecurity in Hash Functions features 2 Understand
5 Define Pre-image Resistance 2 Understand
6 Define Message Digest in Hashing 1 Remember
7 Definition of Non-Block Cipher-Based Hash Function 2 Understand
8 Design Principles in Non-Block Cipher-Based Hash Functions 2 Understand
9 Define Collision Resistance advantage 1 Remember
10 Cryptographic Hash Functions vs. Non-Cryptographic Hash Functions 1 Remember
11 What is Hash Functions in Password Security 1 Remember
12 Short notes Birthday Attack on Hash Functions 2 Understand
14 Define Rainbow Table Attack on Hash Functions 1 Remember
15 Write down the Role of Compression Function in Hash Functions 1 Remember
PART-B(13 Marks)
Briefly explain about the Applications and Challenges in Block Cipher- 1 Remember
1
Based Hash Functions
2 Discuss about the Cryptanalysis of Hash Functions 2 Understand
3 Explain about the Hash Function in Data Integrity Verification 2 Understand
4 Briefly explain about theDesign Principles in Hash Functions 1 Remember
5 Explain about the Role of Compression Function in Hash Functions 2 Understand
Briefly explain about Applications of Non-Block Cipher-Based Hash 2 Understand
6
Functions
7 Write down the Role of Nonces in Hash Function Security 1 Remember
Cryptanalysis and Countermeasures for Non-Block Cipher-Based Hash 2 Understand
8
Function
PART-C (15 Marks)
Briefly explain about the Applications and Challenges in Block Cipher- 1 Remember
1
Based Hash Functions
Cryptanalysis and Countermeasures for Non-Block Cipher-Based Hash 2 Understand
2
Function
UNIT 5: CONSTRUCTION
PART-A (2 Marks)
Q.No Question BT
Competence
Level*
1 Define Security in Hash Functions 1 Remember
Difference Strong One-Way Permutation ,Universal One-Way Hash 2 Understand
2
Function
3 Define Universal One-Way Hash Function 2 Understand
4 Define Cryptographic Primitives 2 Understand
5 Define Cryptographic Construction Applications 1 Remember
6 Short notes on Design Principles in Theoretic Construction 2 Understand
7 Define Random Bit Generation for Encryption 1 Remember
8 Write down the Advantages of Pseudo-Random Bit Generation 1 Remember
9 Short notes on Security Implications of Construction Choices 2 Understand
10 Define the Applicability of Theoretic Construction 1 Remember
11 Write down the Use of Hard Bits in Cryptography 2 Understand
12 Define Pseudo-Random Bit Generation Methods 1 Remember
13 Short notes on Theoretic Construction 2 Understand
14 Short notes onHard Bit and Pseudo-Random Bit Generation 2 Understand
15 Define Cryptographic Construction in a Real-World System 1 Remember
PART-B (13 Marks)
1 Briefly explain about the Theoretic Construction of a Hash Function 2 Understand
2 Discuss about the Pseudo-Random Bit Generation in Practice 2 Understand
3 Explain about the Construction of a Secure One-Way Permutatio 1 Remember
Briefly explain about the Universal One-Way Hash Function (UOWHF) 2 Understand
4
Application
5 Explain about the Theoretical Basis of Cryptographic Constructions 2 Understand
6 Discuss about the Efficiency Analysis of Cryptographic Constructions 1 Remember
7 Explain about the Cryptographic Construction in a Real-World System 1 Remember
PART-C (15 Marks)
Briefly explain about the Universal One-Way Hash Function (UOWHF) 2 Understand
1
Application
2 Explain about the Cryptographic Construction in a Real-World System 1 Remember

You might also like