CY-302 – Fundamentals of Cryptography

Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal
New Scheme Based On AICTE Flexible Curricula
CSE-Cyber Security | III-Semester

Syllabus Content & Previous Year Questions

Unit 1: Introduction, Symmetric-key Encryption & Historical Ciphers


Introduction of cryptography , Symmetric-key Encryption, Historical Ciphers, Computational Security, Semantic Security and Pseudorandom Generators (PRGs), Perfect secrecy. One-timepad encryption. Characterizations of perfect secrecy, Limitations of perfect secrecy



Previous Years questions appears in RGPV exam.

Q.1) What is Perfect Secrecy in Crypto System? Explain. (June-2023)

OR

What is meant by perfect secrecy? Give characterization of perfect secrecy. (Dec-2024)


Q.2) Explain the purpose of One-Time Pad encryption? (June-2023)

OR

What do you mean by encryption? Discuss onetime pad encryption technique. (Dec-2024)


Q.3) Explain transposition cipher and polyalphabetic cipher. (Dec-2023)


Q.4) Explain any two of the following? Hill Cipher. (June-2023)

OR

Write short notes on: Play Fair Cipher. (Dec-2023)


Q.5) Write differences between symmetric key ciphers and asymmetric key ciphers. (Dec-2023)

OR

What is Symmetric vs. Asymmetric Encryption? Discuss. (June-2023)

OR

With the help of a suitable figure discuss symmetric encryption technique. (Dec-2024)


Q.6) Explain the following? i) Authenticate ii) Confidentiality iii) Authorization (June-2023)


Q.7) Discuss the applications of Pseudorandom Generators (PRGs) in cryptography. (Dec-2024)


Q.8) Write about different types of security attacks on computer network. Give a classification of attacks. (Dec-2024)


Q.9) Write short notes on any two of the followings: a) Brute Force Attack c) Cryptanalysis (Dec-2024)



Expected Sample Questions for Dec-2025 Exam (Based on Syllabus Analysis)

Q.1) Define Semantic Security. How is it different from Perfect Secrecy? (Predicted)


Q.2) Explain Computational Security. What are the advantages of computational security over perfect secrecy? (Predicted)


Q.3) Explain the limitations of Perfect Secrecy with justification. (Predicted)


Q.4) Write a short note on Vigenere Cipher with an example. (Predicted)

Unit 2: Block Ciphers, DES, AES & MAC


CPA-Secure Ciphers from PRF, Modes of Operations of Block Ciphers, DES, AES and Message Authentication Codes (MAC) ,Information-theoretic Secure MAC, Cryptographic Hash Functions



Previous Years questions appears in RGPV exam.

Q.1) How does the DES algorithm work in cryptography? Discuss with suitable example. (June-2023)

OR

Write short notes on: DES encryption. (Dec-2023)


Q.2) Explain about AES algorithm with suitable example. (June-2023)

OR

Explain the encryption process in AES algorithm. (Dec-2023)


Q.3) Write differences between AES and DES algorithms. (Dec-2023)


Q.4) What is Message Authentication Code (MAC)? Discuss about secure MAC. (June-2023)

OR

What is the need for message authentication? List various techniques used for message authentication. Explain any one. (Dec-2024)


Q.5) Describe ECB mode of block ciphers with a neat diagram. (Dec-2023)


Q.6) What do you know about the term block ciphers? Discuss modes of operations of block ciphers. (Dec-2024)


Q.7) Write about One-way vs Two-way hash functions? (June-2023)



Expected Sample Questions for Dec-2025 Exam (Based on Syllabus Analysis)

Q.1) Explain the Cipher Block Chaining (CBC) mode of operation. What are its advantages? (Predicted)


Q.2) Define CPA (Chosen-Plaintext Attack) Security. Explain how a cipher can be made CPA-secure using a Pseudorandom Function (PRF). (Predicted)


Q.3) What is HMAC? Explain its design objectives and structure. (Predicted)


Q.4) Differentiate between Block Cipher and Stream Cipher with examples. (Predicted)

Unit 3: Hash Functions, Trapdoor Functions & Authenticated Encryption


Ideal-Cipher Model, Davies-Meyer construction and Merkle-Damgård Paradigm, Birthday Attacks on Cryptographic Hash Functions, Applications of Hash Functions, Random Oracle Model and Authenticated Encryption. Generic Constructions of Authenticated Encryption Schemes, Key-exchange Problem, One-way Trapdoor Functions and Cyclic Groups



Previous Years questions appears in RGPV exam.

Q.1) What is Random Oracle Model in cryptography? Explain. (June-2023)


Q.2) What do you mean by trapdoor attacks? Explain. (June-2023)

OR

Illustrate one-way trapdoor functions with an example. (Dec-2023)

OR

Discuss following terms in detail: iii) One way trapdoor (Dec-2024)


Q.3) Explain Davies-Meyer construction of hash function. (Dec-2023)


Q.4) What are the applications of Hash function in cryptography? (Dec-2024)


Q.5) Discuss following terms in detail: i) Birthday attack (Dec-2024)


Q.6) Discuss following terms in detail: ii) Key exchange problem (Dec-2024)


Q.7) Explain the steps of man in the middle attack. (Dec-2023)



Expected Sample Questions for Dec-2025 Exam (Based on Syllabus Analysis)

Q.1) Explain the Merkle-Damgård Paradigm for constructing collision-resistant hash functions. (Predicted)


Q.2) What is Authenticated Encryption? Describe the "Encrypt-then-MAC" generic construction. (Predicted)


Q.3) Discuss the Ideal-Cipher Model and its significance. (Predicted)


Q.4) Explain Cyclic Groups and their role in cryptography. (Predicted)

Unit 4: Discrete Logarithm, Diffie-Hellman & Public-Key Encryption


Discrete-Logarithm Problem, Computational Diffie-Hellman Problem, Decisional , DiffieHellman Problem, Elliptic-Curve Based Cryptography and Public-Key Encryption



Previous Years questions appears in RGPV exam.

Q.1) Write the importance of Discrete Logarithms in Cryptography? (June-2023)

OR

Illustrate discrete logarithmic problem and how it is useful in cryptography? (Dec-2023)


Q.2) Give an overview of Diffie-Hellman problem? Discuss about the main problem that Diffie-Hellman key exchange faces? (June-2023)

OR

Write short notes on: Diffie-Hellman Key Exchange Algorithm (Dec-2023)

OR

With the help of a suitable example write and explain Diffie-Hellman Key Exchange algorithm. (Dec-2024)


Q.3) Describe how encryption and decryption is performed in Elliptic Curve cryptography. (Dec-2023)

OR

Write short notes on any two of the followings: b) Elliptic curve cryptography (Dec-2024)


Q.4) What do you mean by Secret Key Cryptography and Public Key Cryptography? How they are different from one another. (Dec-2024)



Expected Sample Questions for Dec-2025 Exam (Based on Syllabus Analysis)

Q.1) Differentiate between Computational Diffie-Hellman (CDH) and Decisional Diffie-Hellman (DDH) problems. (Predicted)


Q.2) Explain ElGamal Encryption scheme. How is its security related to the Discrete Logarithm Problem? (Predicted)


Q.3) Discuss the advantages of Elliptic Curve Cryptography (ECC) over RSA. (Predicted)

Unit 5: RSA, Digital Signatures, TLS/SSL & Number Theory


CCA -secure Public-key Hybrid Ciphers Based on Diffie-Hellman Problems and RSAassumption, Digital Signatures, Overview of TLS/SSL, Number Theory, Interactive Protocols .



Previous Years questions appears in RGPV exam.

Q.1) Explain the disadvantages of RSA algorithm. (Dec-2023)


Q.2) Perform encryption and decryption using RSA algorithm for $p=5$ $q=11$, $e=3$ and $M=9$. (Dec-2023)

OR

Explain RSA algorithm. Perform encryption and decryption using RSA algorithm for $p=3$, $q=11$ and $e=7$, $M=5.$ (Dec-2024)


Q.3) Explain how authentication can be done using digital signatures? (Dec-2023)

OR

What is Digital Signature? Explain digital signature standard. (Dec-2024)


Q.4) What is a SSL protocol? How many protocols are there in SSL discuss in detail. (June-2023)


Q.5) Discuss the role of number theory used in Cryptography? (June-2023)

OR

Describe Euler's theorem for identifying prime numbers with an example of your own. (Dec-2023)


Q.6) Explain any two of the following? a) Transport Layer Security b) Interactive protocols in Cryptography c) Hybrid Cryptosystem (June-2023)



Expected Sample Questions for Dec-2025 Exam (Based on Syllabus Analysis)

Q.1) What is CCA (Chosen-Ciphertext Attack) security? Explain the need for CCA-secure public-key encryption. (Predicted)


Q.2) Explain the concept of Hybrid Ciphers. How do they combine the benefits of symmetric and asymmetric cryptography? (Predicted)


Q.3) Explain the TLS Handshake protocol in detail. (Predicted)


Q.4) Discuss the RSA Assumption and how it relates to the security of the RSA cryptosystem. (Predicted)