0% found this document useful (0 votes)
166 views4 pages

Cryptography Concepts and Algorithms

The document is a question bank covering various topics in information security and cryptography. It includes questions on attacks, encryption algorithms like RSA and AES, cryptographic principles, and key exchange methods such as Diffie-Hellman. Additionally, it addresses concepts like digital signatures, hashing, and security protocols, providing a comprehensive overview of the field.

Uploaded by

20CE033 Dhruvi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
166 views4 pages

Cryptography Concepts and Algorithms

The document is a question bank covering various topics in information security and cryptography. It includes questions on attacks, encryption algorithms like RSA and AES, cryptographic principles, and key exchange methods such as Diffie-Hellman. Additionally, it addresses concepts like digital signatures, hashing, and security protocols, providing a comprehensive overview of the field.

Uploaded by

20CE033 Dhruvi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

IS Question Bank

1. List and explain various types of attacks?

2. What is Hill Cipher? Generate a Cipher text for plain text “hi” using key
“jefh” using hill cipher.

3. List various mode of cryptographic operation. Explain any one with the
help of diagram.

4. List advantages of asymmetric cryptography over symmetric key


cryptography.

5. Explain encryption and decryption of RSA algorithm.

6. Explain avalanche effect in DES algorithm.

7. Does DES algorithm Secure? Discuss security of DES.

8. List the requirements of public key cryptography.

9. List application of RSA algorithm.

10. Discuss security of Diffie Hellman Key exchange algorithm with the help
of example..

11. Using diagram explain how RSA algorithm can be used to digitally sign
the message.

12. Compute public key and private key of RSA with p-11, q=17 and e = 7.

13. Compute Inverse of b=550 mod m=1759 using Euclid algorithm

14. Explain cryptanalysis attack on cryptographic hash function.

15. Explain pre-image resistance and second pre-image resistance.

16. Write a note on birthday attack.

17. What is collision resistance property of hash function?

18. Explain a simple hash function and its limitation.

19. What is block size and message digest size in SHA 512? With the help of
diagram explain a round of SHA-512 algorithm.

20. Explain mutual authentication using symmetric key cryptography

21. Compare authentication and authorization.


22. Explain Schnorr algorithm for digital signature.

23. Explain one way authentication using symmetric key cryptography.

24. Compare link encryption and end to end encryption.

25. Explain NIST Digital signature algorithm.

26. Define the following terms: (i) Non-repudiation (ii) Data integrity (iii) Confidentiality
27. Distinguish between passive and active security attacks? Define the type of Security attack in
each of the following cases:
(i) A student breaks into a professor’s office to obtain a copy of the next day’s test.
(ii) A student gives a check for $10 to buy a used book. Later she finds that the check was cashed for
$100.
(iii) A student sends hundreds of e-mails per day to another student using a phony return e-mail
address.

28. List and explain various block cipher modes of operation with the help of diagram.
29. What is the purpose of S-boxes in DES? Explain the avalanche effect.
30. Construct a Playfair matrix with the key “engineering”. And encrypt the message “test this
Balloon”.
31.
Let M =3243F6A8885A308D313198A2E0370734 be the plain text message and
K=2B7E151628AED2A6ABF7158809CF4F3C be the key in hexadecimal. Perform the following
operation using AES.
(a) Add round key.
(b) Shift row transformation on output of (a)

32.
What is a nonce? What is the difference between a session key and a
master key
?
33.
Differentiate between hashing and encryption. What are the practical
applications of hashing?
34.
Explain Diffie Hellman key exchange algorithm with example.
35
What is public key cryptography? What are the principal elements of a
public-key cryptosystem?
36
Perform encryption and decryption using the RSA algorithm for p=5,
q=11, e=3, M=9.
37
What do you mean by key distribution? Give at least one method for key
distribution with proper illustration.
38
Discuss X.509 Certificates.
39
Discuss message digest generation using SHA-512.
40
What is message authentication code? What is the difference between a
Message authentication code and a one-way hash function? Write the
basic uses of Message authentication code.
41
Encrypt the message “ Asymmetric key cryptography is fun” using
Transposition cipher with key (3,2,6,1,5,4)
42.
Discuss generic model of digital signature process.
43
Using the Viennese cipher, encrypt the word “explanation” using the key
leg.
44
Discuss four general categories of schemes for the distribution of public
keys.
45
Explain Kerberos in detail.
46.
Encrypt the message “CORONA” using Hill Cipher with key [9 4
5 7]
47
Elaborate AES encryption with neat sketches.
48
Discuss Meet-in-the-Middle Attack.
49
Discuss Cipher Block Chaining (CBC) modes of operation with the help
of diagram.
50
What is KDC? With the help of diagram explain how KDC do key
distribution.
51
Discuss briefly the working of KERBEROS authentication protocol.
52
P and Q are two prime numbers. P=17, and Q=31. Take public key E=7.
If plain text value is 2, then what will be the private key and cipher text
value according to RSA algorithm? Explain in detail.
53
Encrypt the message “WE ARE DISCOVERED FLEE AT ONCE” using
Rail fence cipher with rail = 3
54
For Diffie-Hellman algorithm, two publically known numbers are prime
number 23 and primitive root (g) of it is 9. A selects the random integer 4
and B selects 3. Compute the public key of A and B. Also compute
common secret key.
55
Discuss SSL protocol stack.
Discuss Secure Hash Algorithm (SHA)
56
Discuss X.509 authentication service.
57
Consider ElGamal cryptosystem in Z17 with generator 6. If the message
is 13 and the randomness chosen is 10, then find the ciphertext computed
using the public key 7.

You might also like