You are on page 1of 3

Cryptography Questions

Unit 1

Q 1. What is Cryptographic and type

Q 2. What is Shift Cipher (Caesar Cipher) with Advantages and


Disadvantages

Q 3. Explain Affine Cipher with Encryption and Decryption Example

Q 4. Explain Vigenere Cipher Advantages and Disadvantages

Q 5. Encrypt the message using Vigenere Cipher plaintext is apple and


key is
Snow.

Unit 2

Q 7. What is a Message Authentication Code (MAC), and how does it


contribute to data security and integrity in cryptographic communication?

Q 8. Explain the RSA cryptosystem, including the key generation


process, encryption, and decryption.

Q 9. What are the security considerations for hash functions, and how
can they be vulnerable to attacks?

Q 10. Explain the Electronic Codebook (ECB) mode in DES. What are its
strengths and weaknesses in terms of data encryption?

Unit 3

Q 11. What is Elgamal Cryptosystem:


Q 12. What are Finite Fields and why r they important in public key
Cryptography:

Q 13. How do Elliptic Curves relate to public Cryptography:

Q 14. What is the RSA Signature Scheme and what are its security
requirements:

Q 15. What is the Feige-Fiat-Shamir Identification Scheme and how


does it work:

Unit 4

Q 16. What role do certificates play in public-key cryptography?

Q 17. Can you explain the Needham-Schroeder Scheme for session key
Distribution?

Q 18. What is the purpose of Kerberos in key management

Q 19. How does the Shamir Threshold Scheme work in key


management?

Q 20. What is Transport Layer Security (TLS) in the context of key


agreement
Schemes?

Q 21. What is the role of Key Derivation Functions (KDFs) in key


management?

Q 22. Can you explain the Cocks Identity-based Cryptosystem and its
Significance?

======================= END ===========================

You might also like