Introduction To Cyber Security & Cryptography-1st Sem Mca-Msc
Introduction To Cyber Security & Cryptography-1st Sem Mca-Msc
8 MARK
1. Explain the concept of algebraic expressions and provide two examples illustrating how
to simplify them using basic operations.
2. What is the prime numbers and demonstrate with examples how to determine if a number
is prime using different method.
3. Define modular arithmetic and its significance in cryptography. Solve the congruence 7x
≡ 4 (mod 9) and demonstrate the steps used to find the solution.
4. Define an algebraic structure and provide a detailed explanation of its types.
5. Discuss the significance of factorization with 3 example and its procedure
6. Elaborate Properties of Algebraic structure
7. Explain the Chinese Remainder Theorem and solve the following system of congruence:
x ≡ 3 (mod 5)
x ≡ 4 (mod 7)
x ≡ 2 (mod 3)
Show all steps taken to find the solution.
8. Define a group and demonstrate with examples how the set of even integers under
addition satisfies the properties of a group.
9. Explain Fermat's Little Theorem and its significance in cryptography. Use an example to
demonstrate how this theorem can be applied.
10. Solve the linear congruence 3x ≡ 7 (mod 11) and explain the process used to arrive at the
solution.
11. Solve the quadratic congruence x 2≡ 2 (mod 7) and explain the process used to arrive at
the solution.
12. Solve the log29 Mod 11 using Discrete Logarithm and explain the process used to arrive at
the solution.
UNIT 2
1 MARK
1. Define the security goal of Confidentiality.
2. What is the primary objective of Integrity in the context of security?
3. Define Non-repudiation and provide an example scenario.
4. What is Access Control, and how does it contribute to security?
5. How does Data Integrity contribute to overall security?
6. Define Digital Signature and its role in ensuring document authenticity.
7. What is Authentication Exchange, and how is it used in security protocols?
8. Explain the concept of Traffic Padding in the context of security.
9. How does Routing Control enhance security in a network?
10. Describe the purpose of Notarization in security.
8 MARK
1. Define and distinguish between the securities goals of confidentiality, integrity,
authentication, and non-repudiation. Discuss how each contributes to overall information
security.
2. Explore the concept of access control and its significance in safeguarding information.
Provide examples of access control mechanisms and their role in maintaining a secure
environment.
3. Explain the security mechanisms of encipherment, Discuss how these mechanisms
address specific security concerns and contribute to overall data protection.
4. Explain the security mechanisms data integrity Discuss how these mechanisms address
specific security concerns and contribute to overall data protection.
5. Explain the security mechanisms digital signature. Discuss how these mechanisms
address specific security concerns and contribute to overall data protection.
6. Elaborate on the concept of authentication exchange. How does it enhance security, and
what are the key methods used for authentication in various systems?
7. Describe the purpose and functionality of traffic padding in the context of information
security. How does it contribute to maintaining confidentiality and protecting sensitive
data during communication?
8. Discuss the role of routing control in security. How can it be utilized to prevent
unauthorized access and protect against potential threats in a networked environment?
9. Define notarization in the context of security. Explain its significance and how it can be
employed to ensure the authenticity and validity of digital documents or transactions.
10. Explain security principles
UNIT 3
1 MARK
1. Define a monoalphabetic substitution cipher.
2. Provide an example of a polyalphabetic substitution cipher.
3. What is the primary characteristic of transposition ciphers?
4. Distinguish between a stream cipher and a block cipher.
5. Give an example of a transposition cipher.
6. Explain the concept of a substitution box in modern ciphers.
7. Define a permutation box and its role in modern ciphers.
8. What is a product cipher, and how does it enhance security?
9. Differentiate between substitution ciphers and transposition ciphers.
10. What is the key difference between a monoalphabetic and a polyalphabetic cipher?
11. Describe the basic operation of a block cipher.
8 MARK
1. Write a note on Cipher.
2. Write a note on substitution technique.
3. Write a note on Transposition Cipher.
4. Provide an explanation of two methods used in the Vigener cipher.
5. Provide an explanation of various methods of polyalphabetic cipher.
6. Provide an explanation of different transposition techniques.
7. Explain keyed and keyless transposition techniques with examples.
8. Explain stream and block cipher with examples.
9. Explain block cipher modes with diagrams.
10. Note on Permutation Block and S-Box in Cipher with an example.
11. Explain Product cipher with example.
UNIT 4
1MARK
1. Define the structure of a Fiestel cipher.
2. Name the encryption algorithm that is a symmetric key block cipher and was widely used
in the 1970s and 1980s.
3. What is the main structure of Data Encryption Standard (DES)?
4. Explain the concept of a non-Fiestel cipher in the context of DES.
5. Name vulnerability or attack associated with DES.
6. What is the purpose of 2-DES and 3-DES in enhancing security?
7. What does AES stand for, and how does it differ from DES?
8. Describe the basic structure of the Advanced Encryption Standard (AES).
9. What is the significance of key expansion in AES?
10. Name one cryptographic hash function property.
11. What is the purpose of a Secure Hash Algorithm (SHA) in cryptography?
12. Explain the concept of a Message Authentication Code (MAC).
13. Name one widely used cryptographic hash function.
14. How does a hash function contribute to data integrity in cryptography?
15. Differentiate between a block cipher and a message authentication code.
8 MARK
1. Could you explain the structure of DES (Data Encryption Standard)?
2. Provide an explanation of the Fiestel structure in cryptographic algorithms.
3. Can you provide an explanation of the concept behind 2-DES (Double DES)?
4. Offer an explanation of the concept of 3-DES (Triple DES) in cryptography.
5. What is the structural design of AES (Advanced Encryption Standard), and how does it
function?
6. Elaborate on the features of AES (Advanced Encryption Standard) in cryptography.
7. Note on “Cryptographic Hash Function”.
8. Provide an explanation of the concept of MAC (Message Authentication Code) in the
field of cryptography
UNIT 5
1 MARK
1. Define Public Key Cryptosystems (PKC) and mention one type of PKC.
2. What is the significance of trapdoor one-way functions in public key cryptography?
3. Name a well-known cryptosystem that relies on integer factorization as a trapdoor one-
way function.
4. In the RSA cryptosystem, what is the role of the public key in the encryption process?
5. Describe the process of decryption in the RSA cryptosystem.
6. Name another public key cryptosystem based on the discrete logarithm trapdoor.
7. Explain the key generation steps in the El Gamal cryptosystem.
8. In the El Gamal cryptosystem, what is the purpose of the discrete logarithm trapdoor?
9. Provide a brief overview of the encryption process in the El Gamal cryptosystem.
10. What cryptographic concept does the Diffie-Hellman Key Exchange Protocol rely on?
11. Explain the process of encryption in the Diffie-Hellman Key Exchange Protocol.
12. What is a "Man in the Middle" attack, and how does it apply to the Diffie-Hellman
Protocol?
13. How does the Diffie-Hellman Key Exchange Protocol address the issue of secure key
exchange?
8 MARK
1. Elaborate on the Public Key Cryptosystem.
2. Explain the RSA Cryptosystem (RSA algorithm).
3. Provide a Note on the ElGamal Cryptosystem.
4. Explain the Concept of the Diffie-Hellman Key Exchange.
5. Describe a Man-in-the-Middle Attack on the Diffie-Hellman Key Exchange Protocol.
Discuss the potential consequences of such an attack and possible methods to prevent it.
6. Explore the Concept of Trapdoor One-Way Functions and Their Role in Public Key
Cryptosystems. Provide an Example.