Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
49 views2 pages

CNS Assignment Questions QB

The document contains questions about cryptography topics including definitions of terms like cryptography, cryptanalysis, attacks and keys. It also includes questions about classical ciphers like shift ciphers and Playfair ciphers. There are additional questions on topics in symmetric and asymmetric cryptography including RSA algorithm, stream and block ciphers, and the use of prime numbers and modular arithmetic in cryptography techniques.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views2 pages

CNS Assignment Questions QB

The document contains questions about cryptography topics including definitions of terms like cryptography, cryptanalysis, attacks and keys. It also includes questions about classical ciphers like shift ciphers and Playfair ciphers. There are additional questions on topics in symmetric and asymmetric cryptography including RSA algorithm, stream and block ciphers, and the use of prime numbers and modular arithmetic in cryptography techniques.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

ONE Mark Questions

What is the meaning of the word Cryptography?

Who is a cryptanalyst?

Differentiate between active and passive attack?

What is brute force attack?

What is a Shift cipher?

Differentiate between threat and attack?

What is cryptology?

What is a private key and public key?

Give an example of an algorithm used in asymmetric key cryptography?

What is the importance of prime numbers in cryptography?

What is the importance of key in cryptography?

What happens if the key size increased in cryptography?

MODULE-1

Explain the following terms i. Substitution cipher ii. Transposition cipher iii.
Cryptanalysis

Discuss monoalphabetic cipher with an example. How it is different from shift


cipher.

Given the ciphertext QHWZRUN VHFXULWB Generate the cipher by shifting


with a key =5.

Explain the rules of Play fair Cipher. Consider the Plain text: communicate
keyword: computer. Identify the ciphertext using play-fair cipher.

Solve if n=5 is a prime number using the Fermat’s primality test

i)Show if if (Z, +) is a group ii)Show if (G, *) is a cyclic group where g = {1, ω}

Discuss the five ingredients of symmetric encryption and explain the model of
symmetric cryptosystems.
Explain the various polyalphabetic ciphers by taking suitable examples and discuss
the advantage of using one time pad.

List the steps of Euclid Algorithm and using it find the GCD (12,33)

Differentiate between Euler totient function and Euler algorithm. Given the values
a=3, n=10 check if satisfies Euler theorem.

Solve the following Encrypt the message “meet me” using hill cipher with key 9 4
57

Apply Chinese remainder and determine the value of x 4x ≡ 5(mod9) 2x≡


6(mod20)

MODULE – 2

Discuss the six ingredients of public key encryption scheme.

Explain the essential steps for public key encryption with a neat diagram.

Solve using RSA the ciphertext C=10sent to user whose public key is e=5 and
n=35. What is the plaintext M

Explain why RSA algorithm is considered to be secure

Explain how confidentiality and authentication can be achieved through public key
encryption

Solve using RSA algorithm. Given data is as follows: Prime numbers P, Q as 7,17
respectively and the plaintext is to be send is 10. Determine the Ciphertext

Explain RSA algorithm by clearly specifying the steps and explain it with an
example

Compare and contrast stream cipher and block cipher

Solve using the RSA algorithm calculate cipher text for the following data p=11
q=5 e=3 and plaintext=9

Differentiate symmetric and asymmetric cryptography. Explain any


algorithm/method based on symmetric and asymmetric cryptography.

You might also like