0% found this document useful (0 votes)
18 views6 pages

Introduction To Cyber Security & Cryptography-1st Sem Mca-Msc

The document is a question bank for the MCA/MSc 1st semester course on Introduction to Cyber Security and Cryptography at Yenepoya University. It contains various questions categorized into 1-mark and 8-mark sections across multiple units, covering topics such as algebraic structures, security goals, ciphers, encryption standards, and public key cryptography. The questions aim to assess students' understanding of fundamental concepts and their applications in the field of cyber security and cryptography.

Uploaded by

mithunr9961
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views6 pages

Introduction To Cyber Security & Cryptography-1st Sem Mca-Msc

The document is a question bank for the MCA/MSc 1st semester course on Introduction to Cyber Security and Cryptography at Yenepoya University. It contains various questions categorized into 1-mark and 8-mark sections across multiple units, covering topics such as algebraic structures, security goals, ciphers, encryption standards, and public key cryptography. The questions aim to assess students' understanding of fundamental concepts and their applications in the field of cyber security and cryptography.

Uploaded by

mithunr9961
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Yenepoya (Deemed to be University)

Recognized under Sec 3(A) of the UGC Act 1956 Re-


accredited by NAAC with ‘A+’ Grade

MCA/MSC 1st SEM


QUESTION BANK

INTRODUCTION TO CYBER SECURITY & CRYPTOGRAPHY


QUESTION BANK
UNIT 1
1 MARK
1. Give an example of an algebraic structure
2. State Fermat's Little Theorem.
3. Explain Euler's Theorem and its significance in number theory.
4. What is the process of factorization, and why is it important in number theory?
5. Define the Chinese Remainder Theorem.
6. Provide an example of solving a linear congruence.
7. Solve the quadratic congruence x2≡4(mod7).
8. What is the Discrete Logarithm problem in the context of number theory?
9. State the definition of a prime number.
10. Define the term "congruence" in modular arithmetic.

8 MARK
1. Explain the concept of algebraic expressions and provide two examples illustrating how
to simplify them using basic operations.
2. What is the prime numbers and demonstrate with examples how to determine if a number
is prime using different method.
3. Define modular arithmetic and its significance in cryptography. Solve the congruence 7x
≡ 4 (mod 9) and demonstrate the steps used to find the solution.
4. Define an algebraic structure and provide a detailed explanation of its types.
5. Discuss the significance of factorization with 3 example and its procedure
6. Elaborate Properties of Algebraic structure
7. Explain the Chinese Remainder Theorem and solve the following system of congruence:
x ≡ 3 (mod 5)
x ≡ 4 (mod 7)
x ≡ 2 (mod 3)
Show all steps taken to find the solution.
8. Define a group and demonstrate with examples how the set of even integers under
addition satisfies the properties of a group.
9. Explain Fermat's Little Theorem and its significance in cryptography. Use an example to
demonstrate how this theorem can be applied.
10. Solve the linear congruence 3x ≡ 7 (mod 11) and explain the process used to arrive at the
solution.
11. Solve the quadratic congruence x 2≡ 2 (mod 7) and explain the process used to arrive at
the solution.
12. Solve the log29 Mod 11 using Discrete Logarithm and explain the process used to arrive at
the solution.
UNIT 2
1 MARK
1. Define the security goal of Confidentiality.
2. What is the primary objective of Integrity in the context of security?
3. Define Non-repudiation and provide an example scenario.
4. What is Access Control, and how does it contribute to security?
5. How does Data Integrity contribute to overall security?
6. Define Digital Signature and its role in ensuring document authenticity.
7. What is Authentication Exchange, and how is it used in security protocols?
8. Explain the concept of Traffic Padding in the context of security.
9. How does Routing Control enhance security in a network?
10. Describe the purpose of Notarization in security.

8 MARK
1. Define and distinguish between the securities goals of confidentiality, integrity,
authentication, and non-repudiation. Discuss how each contributes to overall information
security.
2. Explore the concept of access control and its significance in safeguarding information.
Provide examples of access control mechanisms and their role in maintaining a secure
environment.
3. Explain the security mechanisms of encipherment, Discuss how these mechanisms
address specific security concerns and contribute to overall data protection.
4. Explain the security mechanisms data integrity Discuss how these mechanisms address
specific security concerns and contribute to overall data protection.
5. Explain the security mechanisms digital signature. Discuss how these mechanisms
address specific security concerns and contribute to overall data protection.
6. Elaborate on the concept of authentication exchange. How does it enhance security, and
what are the key methods used for authentication in various systems?
7. Describe the purpose and functionality of traffic padding in the context of information
security. How does it contribute to maintaining confidentiality and protecting sensitive
data during communication?
8. Discuss the role of routing control in security. How can it be utilized to prevent
unauthorized access and protect against potential threats in a networked environment?
9. Define notarization in the context of security. Explain its significance and how it can be
employed to ensure the authenticity and validity of digital documents or transactions.
10. Explain security principles
UNIT 3
1 MARK
1. Define a monoalphabetic substitution cipher.
2. Provide an example of a polyalphabetic substitution cipher.
3. What is the primary characteristic of transposition ciphers?
4. Distinguish between a stream cipher and a block cipher.
5. Give an example of a transposition cipher.
6. Explain the concept of a substitution box in modern ciphers.
7. Define a permutation box and its role in modern ciphers.
8. What is a product cipher, and how does it enhance security?
9. Differentiate between substitution ciphers and transposition ciphers.
10. What is the key difference between a monoalphabetic and a polyalphabetic cipher?
11. Describe the basic operation of a block cipher.

8 MARK
1. Write a note on Cipher.
2. Write a note on substitution technique.
3. Write a note on Transposition Cipher.
4. Provide an explanation of two methods used in the Vigener cipher.
5. Provide an explanation of various methods of polyalphabetic cipher.
6. Provide an explanation of different transposition techniques.
7. Explain keyed and keyless transposition techniques with examples.
8. Explain stream and block cipher with examples.
9. Explain block cipher modes with diagrams.
10. Note on Permutation Block and S-Box in Cipher with an example.
11. Explain Product cipher with example.

UNIT 4
1MARK
1. Define the structure of a Fiestel cipher.
2. Name the encryption algorithm that is a symmetric key block cipher and was widely used
in the 1970s and 1980s.
3. What is the main structure of Data Encryption Standard (DES)?
4. Explain the concept of a non-Fiestel cipher in the context of DES.
5. Name vulnerability or attack associated with DES.
6. What is the purpose of 2-DES and 3-DES in enhancing security?
7. What does AES stand for, and how does it differ from DES?
8. Describe the basic structure of the Advanced Encryption Standard (AES).
9. What is the significance of key expansion in AES?
10. Name one cryptographic hash function property.
11. What is the purpose of a Secure Hash Algorithm (SHA) in cryptography?
12. Explain the concept of a Message Authentication Code (MAC).
13. Name one widely used cryptographic hash function.
14. How does a hash function contribute to data integrity in cryptography?
15. Differentiate between a block cipher and a message authentication code.

8 MARK
1. Could you explain the structure of DES (Data Encryption Standard)?
2. Provide an explanation of the Fiestel structure in cryptographic algorithms.
3. Can you provide an explanation of the concept behind 2-DES (Double DES)?
4. Offer an explanation of the concept of 3-DES (Triple DES) in cryptography.
5. What is the structural design of AES (Advanced Encryption Standard), and how does it
function?
6. Elaborate on the features of AES (Advanced Encryption Standard) in cryptography.
7. Note on “Cryptographic Hash Function”.
8. Provide an explanation of the concept of MAC (Message Authentication Code) in the
field of cryptography

UNIT 5
1 MARK
1. Define Public Key Cryptosystems (PKC) and mention one type of PKC.
2. What is the significance of trapdoor one-way functions in public key cryptography?
3. Name a well-known cryptosystem that relies on integer factorization as a trapdoor one-
way function.
4. In the RSA cryptosystem, what is the role of the public key in the encryption process?
5. Describe the process of decryption in the RSA cryptosystem.
6. Name another public key cryptosystem based on the discrete logarithm trapdoor.
7. Explain the key generation steps in the El Gamal cryptosystem.
8. In the El Gamal cryptosystem, what is the purpose of the discrete logarithm trapdoor?
9. Provide a brief overview of the encryption process in the El Gamal cryptosystem.
10. What cryptographic concept does the Diffie-Hellman Key Exchange Protocol rely on?
11. Explain the process of encryption in the Diffie-Hellman Key Exchange Protocol.
12. What is a "Man in the Middle" attack, and how does it apply to the Diffie-Hellman
Protocol?
13. How does the Diffie-Hellman Key Exchange Protocol address the issue of secure key
exchange?

8 MARK
1. Elaborate on the Public Key Cryptosystem.
2. Explain the RSA Cryptosystem (RSA algorithm).
3. Provide a Note on the ElGamal Cryptosystem.
4. Explain the Concept of the Diffie-Hellman Key Exchange.
5. Describe a Man-in-the-Middle Attack on the Diffie-Hellman Key Exchange Protocol.
Discuss the potential consequences of such an attack and possible methods to prevent it.
6. Explore the Concept of Trapdoor One-Way Functions and Their Role in Public Key
Cryptosystems. Provide an Example.

You might also like