Cryptography Question-Bank
Cryptography Question-Bank
Cryptography Question-Bank
T’S
S.G.BALEKUNDRI INSTITUTE OF TECHNOLOGY, BELAGAVI
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
CRYPTOGRAPHY, NETWORK SECURITY AND CYBER LAW
MODULE 1
QUESTION BANK
1. What are the motivations of cyber attack? (Attack goals)
2. Explain the different types of cyber attacks
3. Define vulnerability. Explain them in the domain of security
4. Explain different types of defence strategies and techniques
5. Explain guiding principles of modern security practice.
6. How is GCD calculated with Euclid’s algorithm? Calculate the GCD of (270, 192)
7. Explain Euclid’s algorithm
8. Explain Extended Euclidean Algorithm
9. Find the inverse of 12 modulo79
10. Define the terms Ring, Group, Field.
11. What is a ring and a commutative ring (field)? Differentiate
12. For which value of n, does the group G= < Zn*, x> have primitive roots (generator): 17, 20, 38
and 50.
13. Explain Langranges theorem, Euler’s theorem, Fermat’s Little theorem
14. Find the value of Ø( 100) and Ø ( 80)
15. TESTING GENERATOR
16. Explain the Chinese remainder theorem with an example?
17. Explain Chinese Remainder Theorem. Using CRT find ‘x’ from the equations x 7 mod 13 and
x 11 mod 12
18. List the diffrenece between Secret( Symmetric) Versus Public( Asymmetric) key Cryptography
19. Explain different types of cryptographic attacks
20. What is the difference between mono alphabetic and poly alphabetic cipher?
21. Use Caesar cipher (Monoalphabetic substitution) with key =15 to encrypt the message “Hello”.
(advantage and disadvantage ,attack)
22. Use Vigenere Cipher (Polyalphabetic Cipher) with key HEALTH to encrypt the message “Life is
full of surprises”. (advantage and disadvantage ,attack)
23. Using Hill Cipher to encipher the message “we live in a insecure world”. Use the key
(03 02
05 07) (advantage and disadvantage ,attack)
24. What is one time pad technique? List the advantages and disadvantages.
25. What are the different transposition techniques (Elementary Transposition Ciphers)? Explain.
26. What are Confusion and Diffusion properties of Modern Ciphers?
27. Differentiate Block Ciphers and Stream Ciphers
28. What is a product cipher? Explain three round SPN (Substitution Transposition Network)
Network.
29. Name the Ciphers that follow Feistel Structure. Explain Data Encryption Standard (DES)
operation in detail.
30. Explain the attacks on Single DES, Double DES
31. How is meet in the middle attack done in 2-DES?
32. Explain the different modes of operation of block oriented Secret Key system with advantages
and disadvantages.
33. How do you convert a block cipher into a stream cipher by using the Cipher Feedback (CFB)
mode? Explain.
S.S.E.T’S
S.G.BALEKUNDRI INSTITUTE OF TECHNOLOGY, BELAGAVI
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
34. Explain the different steps involved in Linear Cryptanalysis.
1. Explain the historical background, Object, Extent, Scope and Commencement of the Information
Technology Act.
2. Explain the important provisions under IT Act
3. Define Digital Signature. Discuss provisions relating to Digital Signature and Electronic
Governance under the Information Act, 2000
4. What do you understand by Digital Signature? Discuss the use of Digital Signature in e-
governance
5. Attempt the following :
a) Attribution, Acknowledgement and Dispatch of Electronic Records.
b) Duties of the subscribers.
6. Explain the provisions relating to time and place of dispatch and receipt of electronic record.
7. List and explain the Regulation of Certifying Authorities.
8. Discuss the powers and functions of Controller of Certifying Authorities under the Information
Technology Act, 2000.
9. Who will issue DSC (Digital Signature Certificate). What are the necessary steps should be taken
while issuing, Suspension, Revocation of DSC?
10. Explain regarding penalties and Adjudication in IT act
11. Critically examine the various penal provisions under the Information Technology Act, 2000.
12. Discuss provisions relating to Cyber Regulation Appellate Tribunal. Where does the appeal lie
from its decision?
13. Explain the powers of the Cyber Appellate Tribunal
14. What is the liability of network service providers under the Information Technology Act, 2000?
15. Attempt the following :