0% found this document useful (0 votes)
116 views3 pages

Public Key Cryptography Quiz Overview

The document is a comprehensive question bank covering various topics in Cryptography and Network Security, organized into five modules. Each module includes questions that range from applying cryptographic techniques to analyzing security principles and evaluating modern security protocols. The questions are categorized by difficulty levels, providing a structured approach to understanding both classical and contemporary cryptographic methods.

Uploaded by

mskn2331
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
116 views3 pages

Public Key Cryptography Quiz Overview

The document is a comprehensive question bank covering various topics in Cryptography and Network Security, organized into five modules. Each module includes questions that range from applying cryptographic techniques to analyzing security principles and evaluating modern security protocols. The questions are categorized by difficulty levels, providing a structured approach to understanding both classical and contemporary cryptographic methods.

Uploaded by

mskn2331
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Cryptography and Network Security question bank

Module-1: Classical & Block Ciphers


1. (L3) Apply Caesar Cipher with shift=5 to encrypt the text HELLO.
2. (L3) Construct a Playfair cipher key matrix using keyword SECURITY and encrypt
“NETWORK”.
3. (L3) Use Hill Cipher with key matrix [[3,3],[2,5]] to encrypt “HI”.
4. (L4) Compare the security strength of Monoalphabetic Cipher vs Polyalphabetic
Cipher.
5. (L4) Analyze why One-Time Pad is theoretically unbreakable but impractical.
6. (L4) Examine the role of steganography in secure communication.
7. (L4) Break down the working of DES into its major functional steps.
8. (L5) Evaluate the strength of DES against brute force attacks today.
9. (L5) Judge whether block cipher design principles are still relevant in modern ciphers
(AES, etc.).
10. (L5) Criticize the vulnerabilities of classical substitution ciphers in today’s digital
environment.
Module-2: Public Key Cryptography & PRNGs
1. (L3) Apply the Linear Congruential Generator with parameters (m=9, a=4, c=1,
seed=2) to generate the next three random numbers.
2. (L3) Demonstrate an example of RSA encryption with small primes p=7, q=11, e=17
for message M=8.
3. (L3) Implement the Diffie-Hellman Key Exchange with public values p=23, g=5,
private keys a=6, b=15.
4. (L4) Compare Blum Blum Shub Generator with Linear Congruential Generator in
terms of randomness and security.
5. (L4) Analyze the mathematical difficulty that ensures RSA’s security.
6. (L4) Distinguish between Man-in-the-Middle attack on Diffie-Hellman vs brute force
attack on RSA.
7. (L5) Evaluate the efficiency of RSA vs ECC for mobile applications.
8. (L5) Justify the claim that “Diffie-Hellman without authentication is insecure”.
9. (L5) Critique the use of ECC in comparison to RSA in terms of security, speed, and
key size.
10. (L5) Assess the role of public-key cryptosystems in digital signature applications.
Module-3: Hash Functions & Key Management
1. (L3) Apply a simple hash function h(x) = (x mod 10) on inputs {15, 27, 39}.
2. (L3) Demonstrate symmetric key distribution using a trusted third party (KDC).
3. (L3) Illustrate the process of certificate verification using X.509.
4. (L4) Compare the strengths and weaknesses of two simple hash functions.
5. (L4) Analyze why hash functions are required in digital signatures.
6. (L4) Examine the role of Public Key Infrastructure (PKI) in securing e-commerce.
7. (L4) Analyze the risks in distributing public keys without certificates.
8. (L5) Evaluate the effectiveness of PKI in large-scale organizations.
9. (L5) Judge the limitations of symmetric key distribution in cloud environments.
10. (L5) Criticize the security gaps in current certificate management systems.
Module-4: Authentication & Web Security
1. (L3) Apply Kerberos authentication steps for a user requesting access to a file server.
2. (L3) Demonstrate the working of TLS handshake between client and server.
3. (L3) Show how S/MIME ensures confidentiality and integrity of an email.
4. (L4) Compare Pretty Good Privacy (PGP) with S/MIME.
5. (L4) Analyze the weaknesses of password-based authentication systems.
6. (L4) Examine the principle of remote user authentication using asymmetric
encryption.
7. (L5) Evaluate the effectiveness of Kerberos in modern distributed environments.
8. (L5) Judge whether TLS 1.2 is still secure compared to TLS 1.3.
9. (L5) Critique the usability challenges of PGP for common users.
10. (L5) Assess whether email security protocols fully address phishing threats.
Module-5: IP Security & DomainKeys
1. (L3) Illustrate how DomainKeys Identified Mail (DKIM) validates an email.
2. (L3) Demonstrate the use of Security Associations in IPsec.
3. (L3) Apply Encapsulating Security Payload (ESP) to secure a data packet.
4. (L4) Compare AH (Authentication Header) and ESP in IPsec.
5. (L4) Analyze the Internet Key Exchange (IKE) process for setting up IPsec.
6. (L4) Examine the challenges of IPsec deployment in large networks.
7. (L5) Evaluate the effectiveness of IPsec in Virtual Private Networks (VPNs).
8. (L5) Criticize the limitations of DKIM in preventing email spoofing.
9. (L5) Judge whether combining ESP with IKE provides sufficient security against
replay attacks.
10. (L5) Assess the scalability of IPsec in cloud-based environments.

Common questions

Powered by AI

Block cipher design principles focus on functions like confusion and diffusion, which remain relevant as seen in AES's structure. These principles ensure even small changes in input produce significant variations in output, maintaining security against pattern-based attacks. Modern advancements build on these foundational concepts, integrating them into robust algorithms that resist current computational capabilities and cryptographic analysis techniques, demonstrating their ongoing applicability .

RSA's security primarily relies on the difficulty of factoring large integers, which is computationally hard, especially as key sizes increase. Modern RSA typically uses 2048-bit keys, making brute force attacks impractical due to the immense computational power needed. However, methods like quantum computing theoretically threaten RSA's underlying difficulty, unlike classical brute force attacks that RSA's large key sizes effectively neutralize .

Classical substitution ciphers like monoalphabetic ciphers are vulnerable due to their predictable patterns and susceptibility to frequency analysis. In today's environment, with fast computational resources, such ciphers can be cracked almost instantly. This emphasizes the need for complex transformations and large key spaces in modern algorithms to prevent similar attacks, influencing the evolution towards block and stream ciphers used in secure communications .

PKI in large organizations supports secure communications through digital certificates and key management, offering reliable authentication, confidentiality, and data integrity. However, it faces challenges like managing the lifecycle of numerous certificates, ensuring trust across distributed systems, and the potential for compromise or misuse of Certificate Authorities, demanding robust security policies and regular audits to maintain integrity and trust .

Using the key matrix [[3,3],[2,5]], the Hill Cipher encrypts 'HI' by converting letters to numbers (H=7, I=8), forming a vector, and multiplying by the matrix to produce a new set of numbers. The result is (3*7+3*8, 2*7+5*8) = (45, 54), translating to the ciphertext 'MM'. This technique illustrates linear algebra’s application in cryptography and influences modern ciphers by demonstrating complex transformations beyond simple substitution .

Remote user authentication via asymmetric encryption improves security by enabling users to verify identities without sharing private keys, thus preventing eavesdroppers from capturing sensitive authentication data. Despite its robustness, challenges include managing keys, ensuring public key integrity, and computational overhead in high-frequency exchanges, requiring well-structured infrastructure such as PKI for effective deployment .

Given the parameters (m=9, a=4, c=1, seed=2), the LCG calculates the sequence using the formula X_{n+1} = (aX_n + c) mod m. The next three numbers from seed 2 are calculated as follows: 9, (4*2+1) mod 9 = 9, (4*9+1) mod 9 = 1, (4*1+1) mod 9 = 5. LCGs are efficient but can be predictable if parameters are poorly chosen, lacking true randomness, which limits their security in cryptographic applications .

Diffie-Hellman is susceptible to man-in-the-middle attacks as it lacks authentication; attackers can intercept and alter key exchanges. This insecurity is addressed by integrating authentication methods such as digital signatures or certificates to verify participants’ identities and ensure exchanges occur with genuine parties, strengthening the protocol against unauthorized interception .

The One-Time Pad is unbreakable because it uses a key that is as long as the message, completely random, and used only once. This ensures every possible ciphertext is equally likely, providing perfect secrecy. However, its impracticality stems from key distribution and management challenges, as securely distributing and storing such extensive keys is logistically unfeasible. This limits its use in everyday applications where practicality and security must balance .

To apply a Caesar cipher with a shift of 5 to the text 'HELLO', each letter is replaced by the letter five positions forward in the alphabet. Thus, 'H' becomes 'M', 'E' becomes 'J', and so forth, resulting in the ciphertext 'MJQQT'. The Caesar cipher operates on a simple substitution principle where each letter in the plaintext is shifted by a set number of positions down the alphabet, which offers basic encryption but is susceptible to frequency analysis due to its predictable transformation.

You might also like