Cryptography and Networks Question Bank
Cryptography and Networks Question Bank
UNIT-III
1. Explain various mathematics used for asymmetric key cryptography.
2. Explain round functions of Advanced Encryption Standard Algorithm
3. State the differences between diffusion and confusion .
4. Brief the strength of RSA algorithm and analyze its performance.
5. Perform encryption and decryption using RSA for p=17, q=11, e=7,
M=88
6. Write about elliptic curve cryptography.
7. Explain substitute byte transformation in AES.
8. Explain the primitive operations of RC5.
9. Explain the primitive operations of RC5.
10.Differentiate between private key and public key encryption.
11.Perform decryption and encryption using RSA algorithm with
p=3,q=11,e=7,N=5
12.Justify your answer whether Diffie Hellman key exchange protocol is
vulnerable.
User A&B exchange the key using Diffie Hellman algorithm assume A=5,
q=11, XA=2,XB=3 find YA,YB,K
13.Explain the approaches to attack the RSA algorithm.
14.State the difference between AES decryption algorithm and the
equivalent inverse cipher.
15.Explain RSA algorithm in detail. Identify the possible threats for RSA
algorithm and list their counter measures.
UNIT-IV
1. Explain HASH function and its properties in cryptography.
2. Explain the classes of message authentication function.
3. Briefly explain the requirements of message authentication.
4. Differentiate between MAC and Hash function.
5. Differentiate between internal and external error control.
6. Explain the role of compression function in hash function.
7. Explain any one Hash algorithm.
8. Explain the requirements of digital signature scheme.
9. Differentiate between message authentication and one-way hash
function.
10.Write the difference between MD5 and SHA.
11.Explain secure hash algorithm in detail.
12.Explain different types of attacks that are addressed by message
authentication.
13.Give a brief note on digital signature algorithm.
14.Explain in detail about hash function.
15.Discuss about the objectives of HMAC and its security features.
16.Explain MD5 with neat sketch.
UNIT-V
1. Explain the operational description of PGP.
2. Write a short note on S/MIME.
3. Explain the architecture of IP security.
4. Write a short notes on Authentication header and ESP.
5. Explain in detail the operation of SSL .
6. Write a short notes on E-mail security.
7. Explain the services provided by PGP.
8. Differentiate between SSL version 3 and TLS.
9. Give a brief note on IP security.
10. Explain internet key management in IPSEC.
11. Explain SET with neat sketch.
12. Explain the features of SET.
13. Write a short notes on web security.
14. Explain the steps involved in SET.
15. Differentiate between SSL connection and SSL session.
16. Why is the segmentation and reassembly function in PGP needed
explain?