Prince Sultan University
College of Computer & Information Sciences
Department of Computer Science
: Computer Security
Using a block diagram, show the major components of a typical crypto system and
the parameters involved.
the major security problems solved by cryptography?
What is the major difference between symmetric
What are the major characteristics of asymmetric keys?
Explain how confidentiality is maintained in asymmetric key systems.
a client may authenticate a server using public key cryptography (prove
the identity of the server
, assuming that the public key of the server is known
Explain how digital signatures may be implemented using public key cryptography.
What are the
major types of cryptographic ciphers (algorithms)? Briefly describe each
Using a simple plaintext phrase and key, explain how transposition ciphers work.
Using transposition ciphers and the key “wisdom”, transform the sentence “public
aphy” into cipher text.
Explain how exponentiation ciphers work.
What is the major problem with symmetric key algorithms?
Explain how two users may establish a common symmetric key using
Describe in detail the RSA public key c
and state its main
What is the major problem with RSA and public key cryptography in general?