# Cryptography Teacher Interview Preparation Guide **Download PDF** Add New Question

**Download PDF**

Cryptography Teacher related Frequently Asked Questions by expert members with job experience as Cryptography Teacher. These questions and answers will help you strengthen your technical skills, prepare for the new job interview and quickly revise your concepts

## 55 Cryptography Teacher Questions and Answers:

### 1 :: Tell me what is Cryptography?

Cryptography is the art and science of making a cryptosystem that is capable of providing information security.

Cryptography deals with the actual securing of digital data. It refers to the design of mechanisms based on mathematical algorithms that provide fundamental information security services. You can think of cryptography as the establishment of a large toolkit containing different techniques in security applications.

Cryptography deals with the actual securing of digital data. It refers to the design of mechanisms based on mathematical algorithms that provide fundamental information security services. You can think of cryptography as the establishment of a large toolkit containing different techniques in security applications.

### 2 :: Explain me types of Cryptosystems?

Fundamentally, there are two types of cryptosystems based on the manner in which encryption-decryption is carried out in the system −

Symmetric Key Encryption

Asymmetric Key Encryption

The main difference between these cryptosystems is the relationship between the encryption and the decryption key. Logically, in any cryptosystem, both the keys are closely associated. It is practically impossible to decrypt the ciphertext with the key that is unrelated to the encryption key.

Symmetric Key Encryption

Asymmetric Key Encryption

The main difference between these cryptosystems is the relationship between the encryption and the decryption key. Logically, in any cryptosystem, both the keys are closely associated. It is practically impossible to decrypt the ciphertext with the key that is unrelated to the encryption key.

### 3 :: Explain me Monoalphabetic and Polyalphabetic Cipher?

Monoalphabetic cipher is a substitution cipher in which for a given key, the cipher alphabet for each plain alphabet is fixed throughout the encryption process. For example, if ‘A’ is encrypted as ‘D’, for any number of occurrence in that plaintext, ‘A’ will always get encrypted to ‘D’.

All of the substitution ciphers we have discussed earlier in this chapter are monoalphabetic; these ciphers are highly susceptible to cryptanalysis.

Polyalphabetic Cipher is a substitution cipher in which the cipher alphabet for the plain alphabet may be different at different places during the encryption process. The next two examples, playfair and Vigenere Cipher are polyalphabetic ciphers.

All of the substitution ciphers we have discussed earlier in this chapter are monoalphabetic; these ciphers are highly susceptible to cryptanalysis.

Polyalphabetic Cipher is a substitution cipher in which the cipher alphabet for the plain alphabet may be different at different places during the encryption process. The next two examples, playfair and Vigenere Cipher are polyalphabetic ciphers.

### 4 :: What is RSA Cryptosystem?

This cryptosystem is one the initial system. It remains most employed cryptosystem even today. The system was invented by three scholars Ron Rivest, Adi Shamir, and Len Adleman and hence, it is termed as RSA cryptosystem.

We will see two aspects of the RSA cryptosystem, firstly generation of key pair and secondly encryption-decryption algorithms.

We will see two aspects of the RSA cryptosystem, firstly generation of key pair and secondly encryption-decryption algorithms.

### 5 :: What is Elliptic Curve Cryptography (ECC)?

Elliptic Curve Cryptography (ECC) is a term used to describe a suite of cryptographic tools and protocols whose security is based on special versions of the discrete logarithm problem. It does not use numbers modulo p.

ECC is based on sets of numbers that are associated with mathematical objects called elliptic curves. There are rules for adding and computing multiples of these numbers, just as there are for numbers modulo p.

ECC includes a variants of many cryptographic schemes that were initially designed for modular numbers such as ElGamal encryption and Digital Signature Algorithm.

It is believed that the discrete logarithm problem is much harder when applied to points on an elliptic curve. This prompts switching from numbers modulo p to points on an elliptic curve. Also an equivalent security level can be obtained with shorter keys if we use elliptic curve-based variants.

The shorter keys result in two benefits −

Ease of key management

Efficient computation

ECC is based on sets of numbers that are associated with mathematical objects called elliptic curves. There are rules for adding and computing multiples of these numbers, just as there are for numbers modulo p.

ECC includes a variants of many cryptographic schemes that were initially designed for modular numbers such as ElGamal encryption and Digital Signature Algorithm.

It is believed that the discrete logarithm problem is much harder when applied to points on an elliptic curve. This prompts switching from numbers modulo p to points on an elliptic curve. Also an equivalent security level can be obtained with shorter keys if we use elliptic curve-based variants.

The shorter keys result in two benefits −

Ease of key management

Efficient computation

### 6 :: On perform the Mix Columns transformation for the sequence of bytes “77 89 AB CD” we get output

a) {01 55 EE 4A}

b) {0A 44 EF 4A}

c) {08 55 FF 3A}

d) {09 44 DD 4A}

c) {08 55 FF 3A}

Explanation: Perform the mix columns transformation to obtain the output {08 55 FF 3A}.

Explanation: Perform the mix columns transformation to obtain the output {08 55 FF 3A}.

### 7 :: S-AES and S-DES were both developed by the same person as an educational cryptography system to teach students

a) True

b) False

a) True

### 8 :: A substitution cipher substitutes one symbol with

Keys

Others

Multi Parties

Single Party

Others

### 9 :: In cryptography, the order of the letters in a message is rearranged by:

A. transpositional ciphers B. substitution ciphers C. both (a) and (b) D. none of the mentioned

A. transpositional ciphers

### 10 :: We use Cryptography term to transforming messages to make them secure and immune to

Change

Idle

Attacks

Defend

Attacks