ONE Mark Questions
What is the meaning of the word Cryptography?
Who is a cryptanalyst?
Differentiate between active and passive attack?
What is brute force attack?
What is a Shift cipher?
Differentiate between threat and attack?
What is cryptology?
What is a private key and public key?
Give an example of an algorithm used in asymmetric key cryptography?
What is the importance of prime numbers in cryptography?
What is the importance of key in cryptography?
What happens if the key size increased in cryptography?
MODULE-1
Explain the following terms i. Substitution cipher ii. Transposition cipher iii.
Cryptanalysis
Discuss monoalphabetic cipher with an example. How it is different from shift
cipher.
Given the ciphertext QHWZRUN VHFXULWB Generate the cipher by shifting
with a key =5.
Explain the rules of Play fair Cipher. Consider the Plain text: communicate
keyword: computer. Identify the ciphertext using play-fair cipher.
Solve if n=5 is a prime number using the Fermat’s primality test
i)Show if if (Z, +) is a group ii)Show if (G, *) is a cyclic group where g = {1, ω}
Discuss the five ingredients of symmetric encryption and explain the model of
symmetric cryptosystems.
Explain the various polyalphabetic ciphers by taking suitable examples and discuss
the advantage of using one time pad.
List the steps of Euclid Algorithm and using it find the GCD (12,33)
Differentiate between Euler totient function and Euler algorithm. Given the values
a=3, n=10 check if satisfies Euler theorem.
Solve the following Encrypt the message “meet me” using hill cipher with key 9 4
57
Apply Chinese remainder and determine the value of x 4x ≡ 5(mod9) 2x≡
6(mod20)
MODULE – 2
Discuss the six ingredients of public key encryption scheme.
Explain the essential steps for public key encryption with a neat diagram.
Solve using RSA the ciphertext C=10sent to user whose public key is e=5 and
n=35. What is the plaintext M
Explain why RSA algorithm is considered to be secure
Explain how confidentiality and authentication can be achieved through public key
encryption
Solve using RSA algorithm. Given data is as follows: Prime numbers P, Q as 7,17
respectively and the plaintext is to be send is 10. Determine the Ciphertext
Explain RSA algorithm by clearly specifying the steps and explain it with an
example
Compare and contrast stream cipher and block cipher
Solve using the RSA algorithm calculate cipher text for the following data p=11
q=5 e=3 and plaintext=9
Differentiate symmetric and asymmetric cryptography. Explain any
algorithm/method based on symmetric and asymmetric cryptography.