Professional Documents
Culture Documents
2 -Marks
1. Define Cryptography.
2. Problems on hieroglyph.
3. Define mono-alphabetic substitution cipher.
4. Define Caesar shift cipher.
5. Define Steganography.
6. Define Cryptanalysis.
7. Mention Security services of cryptography.
8. What is text Stegnography.
9. Define Cryptosystem.
10. Mention Types of Cryptosystem.
11. Define Symmetric key Encryption.
12. Define Asymmetric key Encryption.
13. Define Hash function.
14. Mention and explain applications of hash functions.
15. Draw the Design of Hashing Algorithm.
16. Define MAC.
17. Explain Limitations of MAC.
3-Marks
MCQ-Questions
2. Confidentiality can only be provided if we perform message encryption before the MAC
generation.
a) True
b) False
3. MAC is a
a) One-to-one mapping.
b) Many-to-one mapping.
c) Onto mapping
d) None of the mentioned
4. If the sender and receiver use different keys, the system is referred to as conventional
cipher system.
a) True
b) False
11. The art and science of breaking the cipher text is known as?
a) Cryptography
b) Crypgenalysis
c) Cryptanalysis
d) Both A and B
a) 1
b) 2
c) 3
d) 4
14. Cryptography term is used to transforming messages to make them secure and to prevent
from
a) Change
b) Defend
c) Idle
d) Attacks
15. Shift cipher is also referred to as the
a)Caesar cipher
b)cipher text
c)Shift cipher
d)None of the above
d) Both algorithm for performing encryption and Decryption and encrypted message
18. In the public key cryptography, the key decrypt the message is
a) Public key
b) Unique key
c) Private key
d) Security key
a) Open Writing
b) Secret Writing
c) Closed Writing
d) Corrupting Data
20. Which of the following is /are offered by the Hash functions?
a) Authentication
b) Non repudiation
c) Data Integrity
d) All of the above