Full CNS Viva QA
Full CNS Viva QA
1. What is Cryptography?
The principles include confidentiality (protection of data from unauthorized access), integrity
(ensuring data accuracy), availability (accessibility to authorized users), authentication (user identity
Symmetric key cryptography uses the same key for both encryption and decryption (e.g., AES,
DES), while asymmetric cryptography uses a pair of public and private keys (e.g., RSA,
Diffie-Hellman).
5. What is steganography?
Steganography is the method of hiding a message within another medium, such as images, audio,
Substitution replaces elements of plaintext with other elements, whereas transposition rearranges
Key size determines the security strength of encryption. Larger key sizes make brute-force attacks
Possible attacks include brute force, cryptanalysis, man-in-the-middle, and replay attacks.
Block ciphers operate on fixed-size blocks of plaintext (e.g., 64-bit or 128-bit), encrypting one
block at a time.
DES is a symmetric key encryption algorithm with a 56-bit key, operating on 64-bit blocks through
3. What is AES?
AES (Advanced Encryption Standard) supports key sizes of 128, 192, or 256 bits. It performs
multiple rounds involving SubBytes, ShiftRows, MixColumns, and AddRoundKey transformations.
4. What is Blowfish?
Blowfish is a symmetric block cipher using variable key lengths (32-448 bits) and operates on
64-bit blocks.
RSA is an asymmetric algorithm that generates public and private keys based on two large prime
numbers. Data encrypted with the public key can only be decrypted using the private key.
It is a method for securely exchanging cryptographic keys over a public channel without sharing
principle.
Hash functions generate a fixed-length hash value from input data, ensuring data integrity (e.g.,
SHA-1, SHA-256).
2. What is SHA?
SHA (Secure Hash Algorithm) is a family of hash functions like SHA-1 (160-bit) and SHA-256
(256-bit), widely used for message integrity.
3. What is HMAC?
HMAC (Hash-based Message Authentication Code) combines a cryptographic hash function with
Digital signatures ensure the authenticity and integrity of messages. The sender signs data with
their private key, and the recipient verifies it using the public key.
5. What is Kerberos?
Kerberos is a network authentication protocol that uses tickets to allow nodes to verify their identity
securely.
1. What is SSL/TLS?
SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are cryptographic protocols that
2. What is HTTPS?
HTTPS (HyperText Transfer Protocol Secure) combines HTTP with SSL/TLS for secure
SSH is a protocol that provides secure remote login and file transfers by encrypting all data
transmitted.
It includes:
WLAN allows wireless network communication within a limited area using IEEE 802.11 standards.
PGP is a cryptographic tool that provides privacy and authentication for email communication
2. What is S/MIME?
S/MIME (Secure/Multipurpose Internet Mail Extensions) provides email encryption and digital
XSS is a vulnerability where attackers inject malicious scripts into trusted websites to steal
sensitive information.
a single login.
It refers to securely transferring payments between bank branches using cryptographic techniques
TEXT BOOKS:
1. Cryptography and Network Security - Principles and Practice: William Stallings, Pearson
2. Cryptography and Network Security: Atul Kahate, McGraw Hill, 3rd Edition