Professional Documents
Culture Documents
SECTION 1
MCQs
Answer:a
Explanation:None.
Answer:b
Explanation:None.
Answer:c
Explanation:None.
Answer:a
Explanation:None.
6. Cryptanalysis is used
a) to find some insecurity in a cryptographic scheme
b) to increase the speed
c) to encrypt the data
d) none of the mentioned
Answer:a
Explanation:None.
Answer:b
Explanation:None.
Answer:a
Explanation:None
Answer:b
Explanation:None.
10. Cryptographic hash function takes an arbitrary block of data and returns
a) fixed size bit string
b) variable size bit string
c) both (a) and (b)
d) none of the mentioned
Answer:a
Explanation:None.
a) cipher.
b) Frames.
c) Outputs.
d) Bits.
a) Authenticated.
b) Joined.
c) Submit.
d) Separate.
a) Others.
b) Data.
c) Keys.
d) Each other.
a) Cipher.
b) Rounds.
c) Encryption.
d) DES function.
a) p.
b) q.
c) n.
d) r.
a) Substitution Cipher.
b) Round ciphers.
c) Transposition Cipher.
d) None.
a) secret key.
b) private key.
c) public key.
d) All of them.
b) Information.
c) Secrets.
d) Transmission.
SECTION 2
General Knowledge
1. what are the components of a cryptosystem?
2. What are the main components of cryptographic algorithm?
3. What do you understand by out of band in symmetric ciphers?
4. What is the guiding principle behind one-time pad systems?
5. What is the main problem with RSA algorithm?
6. Outline the main security components provided by hashing and asymmetry
algorithm.
7. list out the main components of Public Key Infrastructure
8. list the states in which a revoked certificate can find itself
9. what is/are the function of a Registration Authority (RA)
SECTION 3
MATHEMATICAL CRYPTOGRAPHY
1 The question below is concerned with RSA key pair generation.
Taking p = 7 and q = 13 and e = 5, generate the public and the private key pair and use
these keys to test for both encryption and decryption. (7marks)
SECTION 4
APPLICATION BASED ON KNOWLEDGE ACQUIRED
Note: Write as someone that has studied computer cryptography. Any wrong use of
words has a penalty attached to it.
1 In which situations and for which purposes can cryptography be used to protect
information? (3mks).
2 Alice wants to send a message to Bob, without Eve observing it. Alice and Bob have
agreed to use a symmetric cipher. Key exchange has already occurred, and so they share a
key k. Outline the steps that Alice and Bob must follow when they encrypt and decrypt,
respectively. (7mks)
3 a Explain why message authentication alone is insufficient as proof of message origin
in
general, and to settle disputes about whether messages have been sent. (2mks)
b What security service is provided by digital signatures, and explain how this service
relates to message authentication. (2mks).