Modern Cryptography and Steganography
1. What is cryptography? Explain the entire process of cryptography with suitable figure.
2. Explain authentication, integrity and nonrepudiation.
3. Differentiate active attack and passive attack with the help of suitable examples.
4. Define following terms:
i) Cryptanalysis
ii) Cryptologist
iii) Encryption
iv) Cryptographers
v) Cypher text
vi) Rubber Hose cryptanalysis
5. Explain the brute force attack.
6. What is masquerade?
7. Compare Substitution and Transposition techniques.
8. Why is asymmetric cryptography not suitable for huge data?
9. Enlist types of cryptanalysis attacks.
10. Differentiate known plaintext attack and ciphertext only attack.
11. Differentiate between public key and private key cryptography.
12. Compare Substitution and Transposition techniques.
13. Explain monoalphabetic cipher with the example of caesar cipher.
14. Explain chosen ciphertext attack in brief.
15. Explain trapdoor one way function with an example.
16. What is a hybrid cryptosystem?
17. How can frequency analysis attacks be used to break caesar cipher?
18. Explain affine cipher with example.
19. Explain in brief about the one-time pad. Is it possible to read messages encrypted with a
one-time pad if we don’t have access to a one-time pad? Justify your answer.
20. Explain public key cryptography with suitable figure.
21. How encryption and decryption is performed in Caesar cipher? Explain with example.
22. How encryption and decryption is performed in Multiplicative cipher? Explain with
example.
23. How encryption and decryption is performed in Affine cipher? Explain with example.
24. How encryption and decryption is performed in Hill cipher? Explain with example.
25. Find Multiplicative inverse of 11 in Z system.
26
26. How to find inverse of Matrix.
27. In a public key system using RSA, you intercept the cipher text C=8 sent to a user whose
public key is e=13, n=33. What is the plain text M?
28. In a system, an RSA algorithm with p=5 and q=11 is implemented. What is the value of
the decryption key if the value of the encryption key is 27. (Here p and q are two prime
numbers).
29. Discuss mono alphabetic cipher and polyalphabetic cipher.
30. Describe process of cryptography with figure.
31. Find GCD of 56 and 42 using Euclidean algorithm.
32. Explain Extended Euclidean Algorithm with the example.
33. Explain basic, intermediate and advanced protocols in brief.
34. Differentiate symmetric and asymmetric cryptosystem.
35. What is cryptographic protocol? Why do we need cryptographic protocol? Which are
various characteristics of cryptographic protocols?
36. How can you break Caesar cipher? Discuss in detail.
37. Explain digital signatures using public key cryptography, and illustrate the concept with
an appropriate diagram.
38. Differentiate confusion and diffusion.
39. How do encryption and decryption take place in triple DES.? Explain with figure.
40. Enlist and explain various modes of block cipher.
41. Draw and explain single round of DES.
42. Explain key generation in DES.
43. Use the Chinese Remainder Theorem to find an x such that
x ≡ 2 (mod 5)
x ≡ 3 (mod 7)
x ≡ 10 (mod 11)
44. Find x, if possible, such that
2x ≡ 5 (mod 7),
and 3x ≡ 4 (mod 8)
45. What is steganography? Explain the LSB method for image steganography.