0% found this document useful (0 votes)
34 views2 pages

Cryptography Question Bank

Uploaded by

PremKrishna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views2 pages

Cryptography Question Bank

Uploaded by

PremKrishna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Cryptography Question Bank

PART A (Remembering and Understanding)

1. Define symmetric and asymmetric key cryptography.


2. List the key goals of cryptography. [Understanding CO1]
3. What is the importance of key management in public key cryptosystems
4. Define cryptography and explain its significance in data security.
5. What is steganography? Give an example.
6. Explain the role of message authentication in network security.
7. Differentiate between symmetric and asymmetric encryption.
8. What is the purpose of the Euclidean algorithm in cryptography?
9. Explain Fermat's Little Theorem and its relevance in cryptographic applications
10. What is Kerberos? Briefly explain its importance.
11. Describe the basic structure of a firewall.
12. Describe the Chinese Remainder Theorem and give an example of its application.
13. What is a block cipher? Name one popular block cipher algorithm.
14. Explain the concept of a hash function in cryptography.
15. Describe the difference between SSL and TLS.
16. Describe one advantage and one disadvantage of the RSA encryption algorithm.
17. What is the Diffie-Hellman Key Exchange? Why is it important?
18. Briefly describe the concept of a digital signature and its role in authentication.

19. What is the purpose of hashing in cryptography?

20. Explain the concept of message authentication codes (MAC).

PART B (Applying and Analyzing)

1. Explain the OSI security architecture and its importance in network security
2. Illustrate the different types of security attacks
3. Illustrate and explain the block cipher principles.
4. What are the key differences between symmetric and asymmetric encryption?
5. Differentiate between substitution and transposition techniques with examples
6. Describe the Data Encryption Standard (DES) and explain its key features.
7. Discuss the design principles of the Data Encryption Standard (DES). 7. Describe
how RSA ensures secure data transmission
8. Explain the Diffie-Hellman Key Exchange algorithm with an example.
9. Discuss the RSA algorithm and explain how public and private keys are generated.
10. Explain the RSA algorithm and describe the key generation process.
11. Apply the principles of the Advanced Encryption Standard (AES) to encrypt a given
text using a specific key.
12. Analyze the security strengths and weaknesses of hash functions in cryptography.
13. Explain the role of digital signatures in secure communications.
14. What is the importance of digital signatures in modern cryptography?
15. Explain the structure functionality of Pretty Good Privacy (PGP).
16. How does Kerberos ensure secure authentication?
17. Analyze the components of IP security architecture.
Part C

18. . a) Describe the key expansion process in AES.


b) How does AES ensure secure data transmission?
c) Discuss the advantages of AES over DES.
19. a) What are the different types of firewalls?
b) How do firewalls prevent unauthorized access?
c) Discuss the limitations of firewall systems.
20. Describe the function of the Secure Socket Layer (SSL).
21. Describe the function of a digital certificate.
22. a) How are digital signatures generated?
b) What are the key components of a digital signature?
c) Explain the process of verifying a digital signature
23. Explain the role of firewalls in protecting a network.
24. Analyze the importance of firewalls in protecting network security.
25. a) How is the public and private key pair generated in RSA?
b) What are the potential attacks on RSA?
c) How can RSA be strengthened against attacks?
26. Discuss the process of modular arithmetic and its applications in cryptography.
Illustrate with examples how modular exponentiation can be efficiently computed.
27. Explain the steps involved in the RSA algorithm, including key generation,
encryption, and decryption processes. Provide an example calculation.
28. Describe the working principles of the Data Encryption Standard (DES) and discuss
its strengths and weaknesses in modern cryptography.
29. Analyze the strength of DES in comparison to AES.
30. a) Explain the differences between SSL and TLS.
b) How do SSL and TLS provide secure communication?
c) What are the key vulnerabilities in SSL/TLS protocols?
31. Explain the Secure Socket Layer (SSL) protocol and how it ensures secure
communications
32. What are Message Authentication Codes (MACs)?
33. Explain how Message Authentication Codes (MACs) ensure data integrity.
Compare MACs with digital signatures, highlighting their unique features and use
cases.
34. Discuss the Miller-Rabin Primality Test. How is it used in cryptographic applications?
Provide an example.
35. Discuss the importance of authentication protocols in network security.
36. Sketch the structure of Kerberos and explain its role in authentication
37. Describe the Pretty Good Privacy (PGP) system and its application in email security.

*****************************************************************

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy