0% found this document useful (0 votes)
100 views2 pages

Cryptography Exam Questions Guide

The document discusses cryptography and network security topics for a final year computer science course. It includes questions about Feistel encryption algorithms, the difference between diffusion and confusion, triple DES and meet-in-the-middle attacks. It also asks about transposition ciphers, steganography, block ciphers versus stream ciphers and one-time pads. Additional questions cover group, ring and field definitions in abstract algebra, calculating the greatest common divisor using the Euclidean algorithm, Fermat's theorem, Euler's totient function and performing RSA encryption and decryption.

Uploaded by

Siddhant Mishra
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
100 views2 pages

Cryptography Exam Questions Guide

The document discusses cryptography and network security topics for a final year computer science course. It includes questions about Feistel encryption algorithms, the difference between diffusion and confusion, triple DES and meet-in-the-middle attacks. It also asks about transposition ciphers, steganography, block ciphers versus stream ciphers and one-time pads. Additional questions cover group, ring and field definitions in abstract algebra, calculating the greatest common divisor using the Euclidean algorithm, Fermat's theorem, Euler's totient function and performing RSA encryption and decryption.

Uploaded by

Siddhant Mishra
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Cryptography and network Security (cse final year)

Time: Total Marks:30 1. Attempt any three of the following questions: (3*5=15) I. Explain Feistel Encryption and Decryption algorithms. What is the difference between Diffusion and Confusion? II. What is triple DES? Explain the term meet in the middle attack. Differentiate between Session key and Master key.

III. IV.

What is Transposition Cipher? Illustrate an example. What is Steganography? V. What is the difference between a Block cipher and a Stream cipher? Explain the term, one time pad. 2. Attempt any three of the following questions: (3*5=15) I. II. III. Briefly define a Group, Ring and Field. Determine gcd(1970,1066) by Euclidean Algorithms. Explain Fermats theorem. What is Eulers Totient function and calculate the value of 33. Perform encryption and decryption, using RSA algorithm for P= 3, q=11,e=7,M=5 ****************

IV.

You might also like