Explain symmetric cipher in brief.
[3 marks]Describe how the lower bound on key size is related to secrecy and authentication.
[4 marks]Analyze Shannon’s foundation of information theory and its impact on modern cryptography.
[7 marks]What are block codes in coding theory?
[3 marks]Differentiate between randomized ciphers and deterministic ciphers.
[4 marks]Evaluate the importance of secret sharing schemes in secure communication. How does secret sharing enhance the robustness of secure systems?
[7 marks]Assess the use of masking techniques in cryptographic security. How do they contribute to the prevention of side-channel attacks?
[7 marks]What is a shared secret in cryptography?
[3 marks]How does AES (Advanced Encryption Standard) work in securing data?
[4 marks]Analyze the strengths and weaknesses of the Diffie-Hellman key exchange. Discuss potential vulnerabilities and how they can be mitigated.
[7 marks]Explain information-theoretic security in brief.
[3 marks]How do side-channel attacks exploit vulnerabilities in cryptographic systems?
[4 marks]Compare and contrast the principles of information-theoretic security and computational security in cryptographic systems.
[7 marks]Define differential privacy in brief.
[3 marks]What is distributed channel synthesis in the context of secure communication?
[4 marks]Evaluate the role of rate-distortion theory in secure source coding. How does it balance compression and secrecy?
[7 marks]Define strong secrecy and weak secrecy in cryptography.
[3 marks]Explain the concept of partial secrecy in cryptography.
[4 marks]Analyze the differences between strong secrecy and weak secrecy in cryptography. Which is more practical in real-world scenarios?
[7 marks]List applications of Public Key Infrastructure (PKI).
[3 marks]Describe common application of lightweight cryptography.
[4 marks]Analyze the importance of digital and network forensics in incident response. How can effective forensics practices improve security measures?
[7 marks]Briefly explainprimary goal of digital forensics.
[3 marks]How does Public Key Infrastructure (PKI) ensure secure communications?
[4 marks]Assess the impact of Elliptic Curve Cryptography (ECC) on modern encryption practices. How has it changed the landscape of secure communications?
[7 marks]