Ques 1: In cryptography, what is cipher?
Ques 2: What can provide a Cryptography?
Ques 3: Shift ciphers sometimes referred as?
Ques 4: What is Data Encryption Standard (DES)?
Ques 5: What is the use of Cryptanalysis?
Ques 6: Explain about the single round of DES algorithms.
Ques 7: Explain any two types of cipher technique in detail.
Ques 8: Explain classical crypto system and its types.
Ques 9: Explain DES?
Ques 10: What is Stream Ciphers?
Ques 11: What are the essential ingredients of a symmetric cipher? How many keys
are required for two people to communicate via a cipher?
Ques 12: What are the principal elements of a public key crypto – system? What are
the roles of public key and private key?
Ques 13: Write short note on Caesar Cipher.
Ques 1: What is the Full Form of RSA?
Ques 2: What is the need for triple DES? Write the disadvantages of double DES
and explain triple DES.
Ques 3: In a public key system using RSA, you intercept the cipher text C=10 sent
to a user whose public key is e=5, n=35. What is the plain text? Explain the
above problem with an algorithm description.
Ques 4: Write the short note on RSA.
Ques 5: Explain RC5 and CAST128 in detail?
Ques 6: Explain the encryption, decryption and key generation in RSA.
Ques 7: Write short notes on Key Distribution Center.
Ques 8: What is the purpose of the S-boxes in DES? Explain the avalanche effect.
Ques 9: What is triple encryption? Explain triple DES?
Ques 10: Explain in details the Blowfish encryption algorithm. What is the key size
for Blowfish.
Ques 11: Explain in details the role and functioning of key distribution centre?
Ques 12: Write short notes on Key Management and RC5.
Ques 1: Differentiate between Hash Code and Message Authentication Code
(MAC).
Ques 2: What are the requirements of a Message Authentication Code (MAC)?
Ques 3: Differentiate between MD5 and SHA-I.
Ques 4: Explain the concept of Digital Signature in details.
Ques 5: What is Message Digest? Explain in detail.
Ques 6: What do you mean by MAC? What is the difference between a message
authentication code and a one-way hash function?
Ques 7: What is a hash function? What characteristics are needed in a secure hash
algorithm?
Ques 8: What basis arithmetical and logical functions are used in MD5?
Ques 9: What changes in HMAC are required in order to replace one underlying
hash function with another?
Ques 10: What requirement should a digital signature scheme satisfy? Give some
threats associated with a direct digital signature scheme?
Ques 1: What do you understand by E-mail Security? Explain SIME and MIME.
Ques 2: What are Kerberos? What problem was Kerberos designed to address?
Ques 3: Explain Pretty Good Privacy.
Ques 1: Which one of the following is a cryptographic protocol used to secure HTTP
connection?
Ques 2: Explain how the elliptic curves are useful for cryptography?
Ques 3: Write and explain national cyber security policy 2013.
Ques 4: Differentiate SSL and SET.
Ques 5: Explain operation of various hacking devices.
Ques 6: Overview the IT security document.
Ques 7: Explain different issues and challenges in cyber crimes.
Ques 8: Discuss Euler and Chinese reminder theorem.
Ques 9: Briefly explain Diffie-Hellman Key Exchange (DHKE). The Diffie-
Hellman key exchange is being used to establish a secret key between ‘A’
& ‘B’. ‘A’ send ‘B’ (719, 3, 191), B responds with (543). ‘A’s secret key
number X is 16. What is the secret key?
OR
Describes Diffie-Hellman Key Exchange algorithm.
Ques 10: Write short note on recent developments in cryptography.
Ques 11: What is Gaffe generators.
Ques 12: Explain Web Security? What is Secure Electronic Transaction?
Ques 13: Differentiate Secure Socket Layer (SSL) and Transport Layer Security
(TLS).
Ques 14: Explain packet firewall and circuit level firewall.
Ques 15: Differentiate between Intrusion Detection System and Firewall.
Ques 16: Explain the working principle of Differential Power Attacks (DPA) and
show how it can be used to attack cryptosystems?
Ques 17: What is the difference between an unconditionally secured cipher and
computationally secure cipher?
Ques 18: What type of information might be derived from a traffic analysis attack?
What is traffic padding and what is its purpose?