Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
21 views6 pages

NS QB

The document consists of a series of questions related to cryptography, covering topics such as ciphers, encryption standards, key management, digital signatures, email security, and various cryptographic protocols. It includes inquiries about specific algorithms like DES, RSA, and Blowfish, as well as concepts like message authentication codes and hash functions. Additionally, it addresses issues in cyber security and the functioning of cryptographic systems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views6 pages

NS QB

The document consists of a series of questions related to cryptography, covering topics such as ciphers, encryption standards, key management, digital signatures, email security, and various cryptographic protocols. It includes inquiries about specific algorithms like DES, RSA, and Blowfish, as well as concepts like message authentication codes and hash functions. Additionally, it addresses issues in cyber security and the functioning of cryptographic systems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Ques 1: In cryptography, what is cipher?

Ques 2: What can provide a Cryptography?


Ques 3: Shift ciphers sometimes referred as?
Ques 4: What is Data Encryption Standard (DES)?
Ques 5: What is the use of Cryptanalysis?
Ques 6: Explain about the single round of DES algorithms.
Ques 7: Explain any two types of cipher technique in detail.
Ques 8: Explain classical crypto system and its types.
Ques 9: Explain DES?
Ques 10: What is Stream Ciphers?
Ques 11: What are the essential ingredients of a symmetric cipher? How many keys
are required for two people to communicate via a cipher?
Ques 12: What are the principal elements of a public key crypto – system? What are
the roles of public key and private key?
Ques 13: Write short note on Caesar Cipher.
Ques 1: What is the Full Form of RSA?
Ques 2: What is the need for triple DES? Write the disadvantages of double DES
and explain triple DES.
Ques 3: In a public key system using RSA, you intercept the cipher text C=10 sent
to a user whose public key is e=5, n=35. What is the plain text? Explain the
above problem with an algorithm description.
Ques 4: Write the short note on RSA.
Ques 5: Explain RC5 and CAST128 in detail?
Ques 6: Explain the encryption, decryption and key generation in RSA.
Ques 7: Write short notes on Key Distribution Center.
Ques 8: What is the purpose of the S-boxes in DES? Explain the avalanche effect.
Ques 9: What is triple encryption? Explain triple DES?
Ques 10: Explain in details the Blowfish encryption algorithm. What is the key size
for Blowfish.
Ques 11: Explain in details the role and functioning of key distribution centre?
Ques 12: Write short notes on Key Management and RC5.
Ques 1: Differentiate between Hash Code and Message Authentication Code
(MAC).
Ques 2: What are the requirements of a Message Authentication Code (MAC)?
Ques 3: Differentiate between MD5 and SHA-I.
Ques 4: Explain the concept of Digital Signature in details.
Ques 5: What is Message Digest? Explain in detail.
Ques 6: What do you mean by MAC? What is the difference between a message
authentication code and a one-way hash function?
Ques 7: What is a hash function? What characteristics are needed in a secure hash
algorithm?
Ques 8: What basis arithmetical and logical functions are used in MD5?
Ques 9: What changes in HMAC are required in order to replace one underlying
hash function with another?
Ques 10: What requirement should a digital signature scheme satisfy? Give some
threats associated with a direct digital signature scheme?
Ques 1: What do you understand by E-mail Security? Explain SIME and MIME.
Ques 2: What are Kerberos? What problem was Kerberos designed to address?
Ques 3: Explain Pretty Good Privacy.
Ques 1: Which one of the following is a cryptographic protocol used to secure HTTP
connection?
Ques 2: Explain how the elliptic curves are useful for cryptography?
Ques 3: Write and explain national cyber security policy 2013.
Ques 4: Differentiate SSL and SET.
Ques 5: Explain operation of various hacking devices.
Ques 6: Overview the IT security document.
Ques 7: Explain different issues and challenges in cyber crimes.
Ques 8: Discuss Euler and Chinese reminder theorem.
Ques 9: Briefly explain Diffie-Hellman Key Exchange (DHKE). The Diffie-
Hellman key exchange is being used to establish a secret key between ‘A’
& ‘B’. ‘A’ send ‘B’ (719, 3, 191), B responds with (543). ‘A’s secret key
number X is 16. What is the secret key?
OR
Describes Diffie-Hellman Key Exchange algorithm.
Ques 10: Write short note on recent developments in cryptography.
Ques 11: What is Gaffe generators.
Ques 12: Explain Web Security? What is Secure Electronic Transaction?
Ques 13: Differentiate Secure Socket Layer (SSL) and Transport Layer Security
(TLS).
Ques 14: Explain packet firewall and circuit level firewall.
Ques 15: Differentiate between Intrusion Detection System and Firewall.
Ques 16: Explain the working principle of Differential Power Attacks (DPA) and
show how it can be used to attack cryptosystems?
Ques 17: What is the difference between an unconditionally secured cipher and
computationally secure cipher?
Ques 18: What type of information might be derived from a traffic analysis attack?
What is traffic padding and what is its purpose?

You might also like