Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Cryptography(CS/IS Elective) SIMP Questions

Prepared by the CSE/ISE review team

Module-1(study any 6)

1. Define/Explain i)Caesar Cipher with example ii) Cryptography iii) Cryptology iv) Cryptanalysis
2. Differentiate between – i) Stream and block ciphers ii)Diffusion and Confusion
iii) Symmetric and Asymmetric Cipher Systems
3. Explain Playfair Cypher with its rules and examples.
4. Describe Hill Cipher Technique with an example.(both encryption and decryption)
5. Explain Feistel Structure and Traditional structure of Block Cipher
6. Briefly explain Symmetric Cipher Model with block diagram
7. Write a note on Substitution and Transposition

Module-3

1. Explain symmetric key distribution using : i) Symmetric Encryption ii) Asymmetric Encryption
2. Explain analog of Diffie Hellman Key Exchange
3. Write a note on (i) Abelian groups and elaborate on Elliptic Curve Cryptography (ii) Key Distribution
scenario (iii)issues with KDC - 5M/Q
4. Explain different techniques of distribution of Public Keys
5. With a neat diagram, explain Pseudo Random Number Generation based on RSA.
6. Simple problems on Elliptic Curve Arithmetic.
7. Explain Elliptic curve over Real Numbers.

Module-2

1. Elaborate on Public Key Cryptosystems


2. Explain with an example : i) RSA ii) Diffie-Hellman Key Exchange
3. Write a note on Man in the Middle attack
4. Describe Elgamal Cryptographic Systems.
5. Problems on RSA, Diffie-Hellman algorithms.
6. Alice wants to send a message to Bob, without Eve observing it. Alice and Bob have agreed to use a symmetric
cypher. The key exchange has already occurred, outline the steps that Alice and Bob must follow when they
encrypt and decrypt,respectively.
Module-4 (Any 6)

1. Write a note on (i)Email threats (ii)S/MIME certificate processing (iii)DKIM (iv)MIME - 5M/Q
2. With a neat diagram explaining Public key Infrastructure.
3. Justify DKIM functional flow
4. Define Kerberos, depict the overview of Kerberos, State any three Difference between Kerberos 4 and 5.
5. With a neat diagram explain different fields in X.509 certificate format
6. With a neat diagram explain the different key components of the Internet mail architecture
7. Explain confidentiality and authentication services provided by PGP protocol
8. Explain Remote User authentication principles.

Module-5(Any 7- first 5Q is mandatory)

1. What is IPsec? Define different Benefits of IPsec and Categories of IPsec Documents
2. Briefly explain processing model for Outbound and Inbound packets with a diagram
3. Explain the different fields in an ESP packet format with a figure
4. With a neat diagram explain basic combinations of security associations
5. Explain the scenario of IPsec usage with a diagram
6. Briefly explain tunnel mode and transport mode ESP with a neat diagram
7. Explain the basic combinations of security associations
8. Describe IKE header and payload format.

You might also like