Unit2 - Subjective Questions

CSC203 • Practice Questions with Detailed Answers

1

Define Cryptography and explain the four fundamental goals of cryptography.

2

Differentiate between Symmetric and Asymmetric key cryptography.

3

Explain the concept of Cryptographic Hash Functions and list their three distinct properties.

4

Describe the RSA algorithm, detailing the steps for Key Generation, Encryption, and Decryption.

5

What is a Digital Signature? Explain how it provides Authentication, Non-repudiation, and Integrity.

6

Explain the Diffie-Hellman Key Exchange algorithm with a mathematical example.

7

Distinguish between Block Ciphers and Stream Ciphers in symmetric cryptography.

8

What is a Message Authentication Code (MAC) and how does it differ from a Digital Signature?

9

Explain Kerckhoffs's Principle and its relevance to modern cryptography.

10

Discuss the 'Avalanche Effect' in the context of cryptographic algorithms.

11

Why is Elliptic Curve Cryptography (ECC) preferred over RSA in blockchain applications?

12

Explain the concept of 'Merkle Trees' and their importance as a cryptographic primitive in Blockchain.

13

Describe the Electronic Codebook (ECB) and Cipher Block Chaining (CBC) modes of operation. Why is ECB generally considered insecure?

14

What is the 'Key Distribution Problem' in symmetric cryptography and how does Hybrid Cryptography solve it?

15

Define a 'Nonce' and explain its role in preventing Replay Attacks and in Blockchain Mining.

16

Explain the concept of a Trapdoor Function and its relation to asymmetric cryptography.

17

What is AES (Advanced Encryption Standard)? Briefly describe its structure.

18

Explain the Birthday Paradox and how it relates to Hash Collisions.

19

What is a Man-in-the-Middle (MITM) attack and how does Public Key Infrastructure (PKI) prevent it?

20

Derive the mathematical proof for the correctness of the RSA Decryption process.