0% found this document useful (0 votes)
5 views3 pages

Crypto Questions

The document outlines an introduction to cryptography, covering key concepts, types of ciphers, and various encryption algorithms such as DES and AES. It also discusses public key cryptography, hash functions, network security practices, and real-world applications of cryptographic techniques. Additionally, it provides tips for preparing diagrams and practicing numerical problems related to the discussed topics.

Uploaded by

weneyid609
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views3 pages

Crypto Questions

The document outlines an introduction to cryptography, covering key concepts, types of ciphers, and various encryption algorithms such as DES and AES. It also discusses public key cryptography, hash functions, network security practices, and real-world applications of cryptographic techniques. Additionally, it provides tips for preparing diagrams and practicing numerical problems related to the discussed topics.

Uploaded by

weneyid609
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Unit 1: Introduction to Cryptography

1. Define cryptography. What are the goals of cryptography?

2. Explain the differences between symmetric and asymmetric key cryptography.

3. What is the Monoalphabetic Cipher? Encrypt the message “HELLO” using Caesar Cipher
with shift 3.

4. Describe Playfair Cipher with example.

5. Explain the working of Vigenère Cipher.

6. Write short notes on Substitution and Transposition techniques.

Unit 2: Block Ciphers and DES

1. What is the structure of a Feistel cipher?

2. Explain the architecture and working of the DES (Data Encryption Standard).

3. What are the weaknesses of DES?

4. Describe Triple DES and how it overcomes the limitations of DES.

5. Compare DES and AES.

6. Describe the AES algorithm with block diagrams.

Unit 3: Public Key Cryptography

1. Explain the RSA algorithm with key generation, encryption, and decryption.

2. What is the Diffie-Hellman Key Exchange? Explain with example.

3. What are the advantages of public-key cryptography?

4. Discuss the ElGamal Cryptosystem.

5. What are the challenges of public key infrastructure (PKI)?

Unit 4: Hash Functions and Authentication

1. What is a cryptographic hash function? Mention its properties.


2. Explain the MD5 algorithm.

3. Describe the SHA-1 and SHA-256 algorithms.

4. What is HMAC and how is it used?

5. Define message authentication and describe its techniques.

Unit 5: Network Security Practices

1. What is a Digital Signature? How is it different from a message authentication code?

2. Explain the Digital Signature Algorithm (DSA).

3. What is IPSec? Describe its components (AH and ESP).

4. What is SSL/TLS and how does it work?

5. Explain the architecture of Firewalls and types (packet-filtering, proxy, etc.).

6. What are Intrusion Detection Systems (IDS)?

Unit 6: Security in Practice

1. What is Kerberos? Explain its working.

2. Describe the concept of Web security – HTTPS, cookies, and session hijacking.

3. What are the types of attacks on networks? (DoS, replay, MITM)

4. Discuss any one case study on real-life cryptographic attack (e.g., Heartbleed, hash
collision).

5. Explain email security: PGP and S/MIME.

Tips:

• Prepare diagrams for algorithms (RSA, DES, AES).

• Practice numerical problems on RSA, Caesar, and Playfair ciphers.

• Know real-world applications and recent security breaches for case study-based
questions.

You might also like