You are on page 1of 6

SCHOOL: UCT-HIT

COURSE: COMPUTER SECURITY AND CRYPTOGRAPHY


TERM: FIRST SEMESTER EXAM
DURATION:

SECTION 1

MCQs

1. In cryptography, what is cipher?


a) algorithm for performing encryption and decryption
b) encrypted message
c) both (a) and (b)
d) none of the mentioned

Answer:a
Explanation:None.

2. In asymmetric key cryptography, the private key is kept by


a) sender
b) receiver
c) sender and receiver
d) all the connected devices to the network

Answer:b
Explanation:None.

3. Which one of the following algorithm is not used in asymmetric-key cryptography?


a) RSA algorithm
b) diffie-hellman algorithm
c) electronic code book algorithm
d) none of the mentioned

Answer:c
Explanation:None.

4. In cryptography, the order of the letters in a message is rearranged by


a) transpositional ciphers
b) substitution ciphers
c) both (a) and (b)
d) none of the mentioned
Answer:a
Explanation:None.

5. What is data encryption standard (DES)?


a) block cipher
b) stream cipher
c) bit cipher
d) none of the mentioned

Answer:a
Explanation:None.

6. Cryptanalysis is used
a) to find some insecurity in a cryptographic scheme
b) to increase the speed
c) to encrypt the data
d) none of the mentioned

Answer:a
Explanation:None.

7. Which one of the following is a cryptographic protocol used to secure HTTP


connection?
a) stream control transmission protocol (SCTP)
b) transport layer security (TSL)
c) explicit congestion notification (ECN)
d) resource reservation protocol

Answer:b
Explanation:None.

8. Voice privacy in GSM cellular telephone protocol is provided by


a) A5/2 cipher
b) b5/4 cipher
c) b5/6 cipher
d) b5/8 cipher

Answer:a
Explanation:None

9. ElGamal encryption system is


a) symmetric key encryption algorithm
b) asymmetric key encryption algorithm
c) not an encryption algorithm
d) none of the mentioned

Answer:b
Explanation:None.

10. Cryptographic hash function takes an arbitrary block of data and returns
a) fixed size bit string
b) variable size bit string
c) both (a) and (b)
d) none of the mentioned

Answer:a
Explanation:None.

A straight permutation cipher or a straight P-box has same number of inputs as

a) cipher.

b) Frames.

c) Outputs.

d) Bits.

Man-in-the-middle attack can endanger security of Diffie-Hellman method if two parties


are not

a) Authenticated.

b) Joined.

c) Submit.

d) Separate.

In Asymmetric-Key Cryptography, two keys, e and d, have a special relationship to

a) Others.

b) Data.

c) Keys.
d) Each other.

Heart of Data Encryption Standard (DES), is the

a) Cipher.

b) Rounds.

c) Encryption.

d) DES function.

For RSA to work, value of P must be less than value of

a) p.

b) q.

c) n.

d) r.

Ciphers of today are called

a) Substitution Cipher.

b) Round ciphers.

c) Transposition Cipher.

d) None.

Keys used in cryptography are

a) secret key.

b) private key.

c) public key.

d) All of them.

Symmetric-key cryptography started thousands of years ago when people needed to


exchange
a) Files.

b) Information.

c) Secrets.

d) Transmission.

SECTION 2
General Knowledge
1. what are the components of a cryptosystem?
2. What are the main components of cryptographic algorithm?
3. What do you understand by out of band in symmetric ciphers?
4. What is the guiding principle behind one-time pad systems?
5. What is the main problem with RSA algorithm?
6. Outline the main security components provided by hashing and asymmetry
algorithm.
7. list out the main components of Public Key Infrastructure
8. list the states in which a revoked certificate can find itself
9. what is/are the function of a Registration Authority (RA)

SECTION 3
MATHEMATICAL CRYPTOGRAPHY
1 The question below is concerned with RSA key pair generation.
Taking p = 7 and q = 13 and e = 5, generate the public and the private key pair and use
these keys to test for both encryption and decryption. (7marks)
SECTION 4
APPLICATION BASED ON KNOWLEDGE ACQUIRED
Note: Write as someone that has studied computer cryptography. Any wrong use of
words has a penalty attached to it.
1 In which situations and for which purposes can cryptography be used to protect
information? (3mks).
2 Alice wants to send a message to Bob, without Eve observing it. Alice and Bob have
agreed to use a symmetric cipher. Key exchange has already occurred, and so they share a
key k. Outline the steps that Alice and Bob must follow when they encrypt and decrypt,
respectively. (7mks)
3 a Explain why message authentication alone is insufficient as proof of message origin
in
general, and to settle disputes about whether messages have been sent. (2mks)
b What security service is provided by digital signatures, and explain how this service
relates to message authentication. (2mks).

You might also like