Interview Questions.

Top 100+ Cryptography Interview Questions And Answers


Top 100+ Cryptography Interview Questions And Answers

Question 1. What Is Rsa?

Answer :

RSA is a publickey cryptosystem for both encryption and authentication? it turned into invented in 1977 by using Ron Rivest, Adi Shamir, and Leonard Adleman [RSA78]. It works as follows: take  large primes, p and q, and discover their product n = pq ? n is referred to as the modulus. Choose a variety of, e, less than n and comparatively high to (p1)( q1), this means that that e and (p1)( q1)

don't have any commonplace factors besides 1.

Find any other quantity d such that (ed 1) is divisible by way of (p1)( q1).

The values e and d are referred to as the public and private exponents, respectively. The public secret's the pair (n,e)? the private key is (n,d). The elements p and q maybe saved with the personal key, or destroyed.

Question 2. How Fast Is Rsa?

Answer :

An "RSA operation," whether or not for encrypting or decrypting, signing or verifying, is basically a modular exponentiation, which can be done through a sequence of modular multiplications.

In realistic applications, it's miles common to choose a small public exponent for the public key? in reality, whole businesses of users can use the equal public exponent, each with a exceptional modulus. (There are a few regulations at the prime elements of the modulus while the public exponent is fixed.) This makes encryption quicker than decryption and verification faster than signing. With regular modular exponentiation algorithms, publickey operations take O(k2) steps, privatekey operations take O( k3) steps, and key technology takes O(k4) steps, in which okay is the range of bits in the modulus. ( Onotation refers to the top bound on the asymptotic running time of an set of rules.) "Fast multiplication" strategies, along with FFTbased methods, require asymptotically fewer steps, although in exercise they're not as common due to their first rate software program complexity and the reality that they will honestly be slower for normal key sizes.

C++ Interview Questions
Question 3. What Would It Take To Break Rsa?

Answer :

There are some feasible interpretations of "breaking RSA." The most unfavourable might be for an attacker to find out the personal key similar to a given public key? this will permit the attacker both to study all messages encrypted with the general public key and to forge signatures. The obvious way to do this assault is to issue the public modulus, n, into its two prime elements, p and q.

From p, q, and e, the public exponent, the attacker can without problems get d, the private exponent. The tough element is factoring n? the security of RSA depends on factoring being hard. In fact, the assignment of recuperating the personal secret's equal to the challenge of factoring the modulus: you can use d to component n, as well as use the factorization of n to discover d. It must be stated that hardware improvements alone will no longer weaken RSA, so long as suitable key lengths are used? in truth, hardware improvements should increase the safety of RSA.

Question 4. Are Strong Primes Necessary In Rsa

Answer :

In the literature bearing on RSA, it has regularly been suggested that in selecting a key pair, one ought to use socalled "sturdy" primes p and q to generate the modulus n. Strong primes are those with sure houses that make the product n hard to component by using particular factoring strategies? such houses have included, for instance, the existence of a big prime factor of p1 and a huge high issue of p+1. The reason for these worries is that some factoring techniques are mainly appropriate to primes p such that p 1 or p+1 has handiest small elements? sturdy primes are resistant to these assaults.

C++ Tutorial
Question five. How Large A Modulus (key) Should Be Used In Rsa?

Answer :

The great size for an RSA modulus depends on one's security desires. The large the modulus, the greater the safety, however additionally the slower the RSA operations. One should choose a modulus length upon attention, first, of one's security wishes, which includes the fee of the protected facts and the way lengthy it wishes to be protected, and, second, of how effective one's potential enemies are.

Odlyzko's paper considers the security of RSA key sizes based totally on factoring techniques to be had in 1995 and the ability to tap big computational resources via computer networks. A precise evaluation of the safety of 512bit RSA keys indicates that one may be factored for much less than $a million in cost and 8 months of effort in 1997 [Rob95d]. It is assumed that 512bit keys not provide sufficient protection with the arrival of recent factoring algorithms and allotted computing. Such keys have to not be used after 1997 or 1998. Recommended key sizes are now 768 bits for non-public use, 1024 bits for company use, and 2048 bits for extremely valuable keys just like the key pair of a certifying authority. A 768bit secret's anticipated to be secure till as a minimum the year 2004.

J2EE Interview Questions
Question 6. How Large Should The Primes Be?

Answer :

The  primes, p and q, which compose the modulus, have to be of approximately same period? this will make the modulus harder to thing than if one of the primes was very small. Thus if one chooses to apply a 768bit modulus, the primes ought to every have period about 384 bits. If the 2 primes are extremely close (identical except for, say, 100 two hundred bits), there's a potential protection threat, but the opportunity that two randomly chosen primes are so close is negligible.

Question 7. Can Users Of Rsa Run Out Of Distinct Primes?

Answer :

There are sufficient high numbers that RSA customers will by no means run out of them. The Prime Number Theorem states that the quantity of primes less than or identical to n is asymptotically n/log n. This manner that the range of high numbers of length 512 bits or much less is ready 10150, that is more than a few more than the number of atoms within the recognized universe.

J2EE Tutorial C Interview Questions
Question eight. How Do You Know If A Number Is Prime?

Answer :

It is usually encouraged to use probabilistic primality trying out, which is a whole lot quicker than sincerely proving that various is prime. One can use a probabilistic check that determines whether or not a number of is top with arbitrarily small possibility of errors, say, much less than 2100.

Question nine. How Is Rsa Used For Authentication In Practice? What Are Rsa Digital Signatures?

Answer :

RSA is typically mixed with a hash feature to sign a message. 

Suppose Alice needs to send a signed message to Bob. She applies a hash function to the message to create a message digest, which serves as a "digital fingerprint" of the message. She then encrypts the message digest together with her RSA non-public key? that is the virtual signature, which she sends to Bob together with the message itself. Bob, upon receiving the message and signature, decrypts the signature with Alice's public key to get better the message digest. He then hashes the message with the identical hash feature Alice used and compares the result to the message digest decrypted from the signature. If they're precisely identical, the signature has been successfully confirmed and he can be confident that the message did indeed come from Alice. If they're no longer identical, then the message both originated someplace else or turned into altered after it was signed, and he rejects the message.

With the technique just described, anybody examine the message and confirm the signature. This might not be relevant to conditions wherein Alice wishes to retain the secrecy of the document. In this example she may additionally want to sign the record then encrypt it the usage of Bob's public key. Bob will then need to decrypt using his non-public key and confirm the signature on the recovered message using Alice's public key. A third birthday celebration can also verify the signature at this degree.

Microsoft Azure Interview Questions
Question 10. What Are The Alternatives To Rsa?

Answer :

Many other publickey cryptosystems were proposed, as a glance through the court cases of the annual Crypto, Eurocrypt, and Asiacrypt meetings speedy reveals. Some of the publickey cryptosystems could be discussed in previous Question.

A mathematical trouble known as the knapsack hassle changed into the basis for numerous structures, but these have misplaced want due to the fact several versions have been damaged. Another system, designed through ElGamal, is primarily based on the discrete logarithm trouble. The ElGamal system was, in component, the premise for several later signature methods, such as one by using Schnorr [Sch90], which in turn was the premise for DSS, the Digital Signature Standard. The ElGamal gadget has been used successfully in applications? it is slower for encryption and verification than RSA and its signatures are larger than RSA signatures.

In 1976, before RSA, Diffie and Hellman proposed a system for key alternate handiest? it allows relaxed trade of keys in an otherwise conventional secretkey machine. This gadget is in use nowadays.

C Tutorial
Question 11. Is Rsa Currently In Use Today?

Answer :

The use of RSA is almost ubiquitous nowadays. It is currently utilized in a extensive form of merchandise, structures, and industries around the sector. It is found in lots of business software program merchandise and is planned to be in many extra. It is built into modern-day operating systems with the aid of Microsoft, Apple, Sun, and Novell. In hardware, RSA may be determined in comfy telephones, on Ethernet network cards, and on clever playing cards. In addition, RSA is included into all of the principal protocols for secure Internet communications, such as SSL, SHTTP, SEPP, S/MIME, S/WAN, STT and PCT. It is likewise used internally in many institutions, consisting of branches of the U.S. Government, principal agencies, national laboratories, and universities.

Restful net provider Interview Questions
Question 12. Is Rsa An O????cial Standard Today?

Answer :

RSA is a part of many professional requirements global. The ISO (International Standards Organization) 9796 wellknown lists RSA as a well suited cryptographic set of rules, as does the ITUT X.509 safety wellknown. RSA is part of the Society for Worldwide Interbank Financial Telecommunications (SWIFT) trendy, the French financial enterprise's ETEBAC 5 general, and the ANSI X9.31 draft general for the U.S. Banking enterprise. The Australian key control general, AS2805.6.5.Three, additionally specifies RSA.

C++ Interview Questions
Question 13. Is Rsa A De Facto Standard?

Answer :

RSA is the maximum widely used publickey cryptosystem these days and has regularly been known as a de facto widespread. Regardless of the reputable standards, the existence of a de facto trendy is extraordinarily vital for the improvement of a virtual economy. If one publickey gadget is used everywhere for authentication, then signed virtual documents can be exchanged among users in extraordinary international locations the usage of unique software on special platforms? this interoperability is vital for a true virtual economic system to expand. Adoption of RSA has grown to the volume that requirements are being written to deal with RSA. When the U.S. Economic enterprise became growing requirements for virtual signatures, it first evolved ANSI X9.30 to aid the federal requirement of using the Digital Signature Standard. They then changed X9.30 to X9.31 with the emphasis on RSA digital signatures to aid the de facto fashionable of financial establishments.

Microsoft Azure Tutorial
Question 14. Is Rsa Patented?

Answer :

RSA is patented beneath U.S. Patent four,405,829, issued September 20, 1983 and held with the aid of RSA Data Security, Inc. Of Redwood City, California? the patent expires 17 years after difficulty, in 2000. RSA Data Security has a fashionable, royaltybased licensing coverage which can be changed for special occasions. The U.S. Authorities can use RSA without a license because it changed into invented at MIT with partial government investment.

Question 15. Can Rsa Be Exported From The United States?

Answer :

Export of RSA falls beneath the same U.S. Legal guidelines as all different cryptographic products.

RSA used for authentication is greater easily exported than whilst it's miles used for privateness. In the previous case, export is allowed no matter key (modulus) size, despite the fact that the exporter ought to demonstrate that the product can't be easily converted to apply for encryption. In the case of RSA used for privateness (encryption), the U.S. Government commonly does now not allow export if the important thing size exceeds 512 bits.

Jenkins Interview Questions
Question 16. What Is Authenticated Di????e-hellman Key Agreement?

Answer :

The authenticated DiffieHellman key settlement protocol, or StationtoStation (STS) protocol, was advanced by using Diffie, van Oorschot, and Wiener in 1992 [DVW92] to defeat the middleperson attack at the DiffieHellman key settlement protocol. The immunity is executed with the aid of allowing the 2 parties to authenticate themselves to every other through the usage of virtual signatures and publickey certificates.

Restful internet service Tutorial
Question 17. What Are Dsa And Dss?

Answer :

The Digital Signature Algorithm (DSA) became published by means of the National Institute of Standards and Technology (NIST) in the Digital Signature Standard (DSS), that's part of the U.S. Authorities's Capstone mission. DSS changed into decided on by way of NIST, in cooperation with the NSA, to be the digital authentication popular of the U.S. Government. The widespread changed into issued on May 19, 1994.

DSA is based at the discrete logarithm trouble and derives from cryptosystems proposed by way of Schnorr and ElGamal. It is for authentication handiest. For a detailed description of DSA.

In DSA, signature era is quicker than signature verification, whereas in RSA, signature verification is faster than signature technology (if the public and private exponents, respectively, are selected for this belongings, which is the standard case). NIST claims that it's far an advantage of DSA that signing is faster, but many people in cryptography think that it's miles higher for verification to be the quicker operation.

Software Development Lifecycle (SDLC) Interview Questions
Question 18. Is Dsa Secure?

Answer :

DSA is based on the issue of computing discrete logarithm. The algorithm is usually taken into consideration relaxed when the important thing length is massive sufficient. DSS changed into at first proposed by way of NIST with a set 512bit key length. After a whole lot grievance that this isn't always secure sufficient mainly for longterm protection, NIST revised DSS to permit key sizes as much as 1024 bits.

The specific shape of the discrete logarithm problem utilized in DSA is to compute discrete logarithms in sure subgroups in the finite field GF(p) for a few top p. The problem become first proposed for cryptographic use in 1989. Even although no attacks had been said on this form of the discrete logarithm problem, further evaluation is necessary to absolutely apprehend the difficulty of the problem.

J2EE Interview Questions
Question 19. Is The Use Of Dsa Covered By Any Patents?

Answer :

David Kravitz, former member of the NSA, holds a patent on DSA. Claus P. Schnorr has asserted that his patent covers positive implementations of DSA.

Jenkins Tutorial
Question 20. What Are Special Signature Schemes?

Answer :

Since the time Diffie and Hellman delivered the idea of virtual signatures, many signature schemes have been proposed in cryptographic literature. These schemes may be classified as either traditional digital signature schemes (e.G., RSA, DSA) or special signature schemes relying on their security functions.

In a conventional signature scheme (the original version described via Diffie and Hellman), we typically count on the subsequent scenario:

The signer is aware of the contents of the message that he has signed. Anyone who knows the general public key of the signer can confirm the correctness of the signature at any time without any consent or input from the signer. (Digital signature schemes with this assets are called selfauthenticating signature schemes.)

SAP Smart Forms Interview Questions
Question 21. What Is A Blind Signature Scheme?

Answer :

Blind signature schemes, first delivered with the aid of Chaum, permit someone to get a message signed via every other party without revealing any statistics approximately the message to the other birthday party.

Chaum tested the implementation of this idea using RSA signatures as follows: Suppose Alice has a message m that she needs to have signed by means of Bob, and she does no longer want Bob to study something about m. Let (n,e) be Bob's public key and (n,d) be his private key. Alice generates a random value r such that gcd(r, n) = 1 and sends to Bob. The cost m' is "blinded" through the random price r, and hence Bob can derive no beneficial facts from it. Bob returns the signed value to Alice. Since s'=rmd mod n, Alice can attain the genuine signature s of m by computing. Now Alice's message has a signature she couldn't have obtained on her very own. This signature scheme is relaxed supplied that factoring and root extraction continue to be difficult. However, irrespective of the reputation of those issues the signature scheme is unconditionally "blind" due to the fact r is random. The random r does not allow the signer to study the message despite the fact that the signer can clear up the underlying tough troubles.

Question 22. What Is A Designated Confirmer Signature?

Answer :

A specified confirmer signature strikes a balance among selfauthenticating virtual signatures and zeroknowledge proofs. While the previous permits all and sundry to verify a signature, the latter can handiest persuade one recipient at a time of the authenticity of a given document, and only through interplay with the signer. A exact confirmer signature lets in positive designated parties to confirm the authenticity of a report with out the want for the signer's input. At the same time, without the aid of either the signer or the special events, it isn't possible to confirm the authenticity of a given file. Chaum advanced implementations of particular confirmer signatures with one or extra confirmers the usage of RSA digital signatures.

Software Development Lifecycle (SDLC) Tutorial
Question 23. What Is A Fail-forestall Signature Scheme?

Answer :

A failstop signature scheme is a form of signature devised by way of van Heyst and Pederson [VP92] to protect towards the opportunity that an enemy can be able to forge someone's signature. It is a variation of the onetime signature scheme, wherein handiest a unmarried message can be signed and protected with the aid of a given key at a time. The scheme is based totally at the discrete logarithm hassle. In particular, if an enemy can forge a signature, then the real signer can show that forgery has taken vicinity by using demonstrating the answer of a supposedly difficult hassle. Thus the forger's capacity to resolve that trouble is transferred to the real signer. (The time period "failstop" refers back to the reality that a signer can discover and forestall disasters, i.E., forgeries. Note that if the enemy obtains an actual copy of the signer's personal key, forgery can not be detected. What the scheme detects are forgeries primarily based on cryptanalysis.)

Spring Batch Interview Questions
Question 24. What Is A Group Signature?

Answer :

A organization signature, delivered by Chaum and van Heijst, allows any member of a group to digitally signal a report in a manner such that a verifier can verify that it got here from the group, but does no longer recognise which individual in the group signed the file. The protocol permits for the identity of the signer to be located, in case of disputes, by a chosen group authority who has a few auxiliary facts. Unfortunately, whenever a member of the organization symptoms a record, a new key pair must be generated for the signer. The generation of recent key pairs reasons the duration of both the institution participants' mystery keys and the detailed authority's auxiliary records to develop. This has a tendency to reason the scheme to grow to be unwieldy when utilized by a collection to signal numerous messages or when used for an prolonged time frame. Some upgrades have been made inside the performance of this scheme.

C Interview Questions
Question 25. What Is Blowfish?

Answer :

Blowfish is a 64bit block cipher advanced by way of Schneier. It is a Feistel cipher and each round consists of a keydependent permutation and a keyanddatadependent substitution. All operations are primarily based on exclusiveors and additions on 32bit words. The key has a variable period (with a most duration of 448 bits) and is used to generate numerous subkey arrays. This cipher became designed in particular for 32bit machines and is substantially quicker than DES. There became an open opposition for the cryptanalysis of Blowfish supported by Dr. Dobb's Journal with a $a thousand prize.

This contest led to April 1995 and most of the effects had been the discoveries of existence of positive susceptible keys , an assault towards a threeround model of Blowfish, and a differential assault against sure variants of Blowfish. However, Blowfish can nevertheless be taken into consideration secure, and Schneier has invited cryptanalysts to maintain investigating his cipher.

Cryptography Tutorial
Question 26. What Is Safer?

Answer :

SAFER (Secure And Fast Encryption Routine) is a nonproprietary block cipher advanced via Massey in 1993 for Cylink Corporation. It is a byteoriented set of rules with a 64bit block length and, in a single model, a 64bit key length. It has a variable range of rounds (most of 10), but a minimum of six rounds is usually recommended. Unlike most current block ciphers, SAFER has slightly one-of-a-kind encryption and decryption methods. Only bytebased operations are employed to ensure its utility in smart cardbased applications which have limited processing power. When first introduced, SAFER became meant to be carried out with a key of duration 64 bits and it become as a consequence named SAFER K64.

Another model of SAFER was designed that could handle 128bit keys and was named SAFER K128.

TCP/IP Interview Questions
Question 27. What Is Feal?

Answer :

The Fast Data Encipherment Algorithm (FEAL) was supplied via Shimizu and Miyaguchi as an alternative to DES. The authentic cipher (called FEAL4) was a fourround cryptosystem with a 64bit block length and a 64bit key size and it became designed to offer excessive overall performance in software program. Soon an expansion of attacks against FEAL4 were announced which includes one attack that required most effective 20 chosen plaintexts. Several outcomes in the cryptanalysis of FEAL8 (eightround version) led the designers to introduce a revised model, FEALN, in which N denoted the range of rounds.

Biham and Shamir developed differential cryptanalytic assaults against FEALN for as much as 31 rounds. In 1994, Ohta and Aoki presented a linear cryptanalytic assault towards FEAL8 that required 225 known plaintexts, and different upgrades accompanied. In the wake of those numerous attacks, FEAL and its derivatives should be taken into consideration insecure.

Microsoft Azure Interview Questions
Question 28. What Is Skipjack?

Answer :

Skipjack is the encryption set of rules contained inside the Clipper chip, and it turned into designed via the NSA. It uses an 80bit key to encrypt 64bit blocks of information. Skipjack may be extra cozy than DES, since it makes use of 80bit keys and scrambles the information for 32 steps, or "rounds"? through contrast, DES makes use of 56bit keys and scrambles the records for only 16 rounds.

The info of Skipjack are classified. The decision now not to make the info of the algorithm publicly to be had has been broadly criticized. Many people are suspicious that Skipjack is not secure, both due to oversight through its designers, or by means of the planned introduction of a mystery trapdoor. By contrast, there were many tries to find weaknesses in DES over the years, due to the fact that its details are public. These numerous tries (and the truth that they have got failed) have made people assured within the protection of DES. Since Skipjack isn't public, the same scrutiny cannot be carried out closer to it, and for this reason a corresponding stage of self assurance might not get up.

SAP Smart Forms Tutorial
Question 29. What Is A Stream Cipher?

Answer :

A circulation cipher is a symmetric encryption set of rules. Stream ciphers may be designed to be surprisingly speedy, a lot faster in truth than any block cipher. While block ciphers operate on large blocks of records, movement ciphers normally perform on smaller devices of plaintext, normally bits. The encryption of any unique plaintext with a block cipher will bring about the equal ciphertext whilst the equal key is used. With a movement cipher, the transformation of those smaller plaintext gadgets will vary, depending on when they may be encountered at some point of the encryption method.

A stream cipher generates what is known as a keystream and encryption is provided via combining the keystream with the plaintext, generally with the bitwise exclusiveor operation. The technology of the keystream can be unbiased of the plaintext and ciphertext (yielding what is termed a synchronous flow cipher) or it can rely on the statistics and its encryption (in which case the circulate cipher is stated to be selfsynchronizing).

Most stream cipher designs are for synchronous circulate ciphers.

Question 30. What Is Seal?

Answer :

The Softwareoptimized Encryption Algorithm (SEAL) turned into designed through Rogaway and Coppersmith in 1993 as a quick flow cipher for 32bit machines. SEAL has a as a substitute involved initialization phase all through which a large set of tables is initialized using the Secure Hash Algorithm. However, the use of research tables at some stage in keystream generation enables to acquire a completely fast performance with simply 5 instructions required in step with byte of output generated.

Question 31. What Is A Linear Feedback Shift Register?

Answer :

A Linear Feedback Shift Register (LFSR) is a mechanism for producing a series of binary bits. The sign in includes a series of cells which are set by an initialization vector that is, most often, the secret key. The behavior of the check in is regulated through a clock and at every clocking instant, the contents of the cells of the sign in are shifted right via one function, and the exclusiveor of a subset of the cellular contents is placed inside the leftmost mobile. One little bit of output is typically derived during this replace system.

Question 32. What Are Shift Register Cascades?

Answer :

A shift sign up cascade is a fixed of LFSRs related collectively in this type of manner that the conduct of 1 specific LFSR relies upon on the conduct of the previous LFSRs within the cascade.

This dependent conduct is commonly carried out by way of the use of one LFSR to govern the clock of the following LFSR. For instance one sign up is probably advanced with the aid of one step if the preceding register output is 1 and superior by means of  steps in any other case. Many one-of-a-kind configurations are viable and sure parameter choices appear to offer very good security .

Question 33. What Are The Shrinking And Self-shrinking Generators?

Answer :

The shrinking generator changed into evolved by Coppersmith, Krawczyk, and Mansour. It is a stream cipher based totally on the easy interaction among the outputs from  LFSRs. The bits of one output are used to determine whether the corresponding bits of the second one output may be used as part of the overall keystream. The shrinking generator is straightforward and scaleable, and has exact safety homes. One downside of the shrinking generator is that the output price of the keystream will no longer be steady except precautions are taken. A version of the shrinking generator is the selfshrinking generator, wherein rather than the usage of one output from one LFSR to "cut back" the output of any other (as inside the shrinking generator), the output of a single LFSR is used to extract bits from the identical output. There are as yet no outcomes at the cryptanalysis of either method.

Restful web provider Interview Questions
Question 34. What Other Stream Ciphers Are There?

Answer :

There are a vast range of opportunity move ciphers that have been proposed in cryptographic literature in addition to an equally big wide variety that appear in implementations and merchandise global.

Many are based on the usage of LFSRs due to the fact that such ciphers tend to be more amenable to analysis and it is less complicated to evaluate the safety that they offer.

Rueppel shows that there are basically 4 distinct methods to stream cipher layout. The first is named the informationtheoretic approach as exemplified via Shannon's analysis of the onetime pad.

The second technique is that of systemtheoretic design. In essence, the cryptographer designs the cipher along set up hints which ensure that the cipher is proof against all recognized attacks. While there may be, of direction, no full-size guarantee that future cryptanalysis may be unsuccessful, it's miles this design technique this is perhaps the maximum not unusual in cipher design.

The third method is to try to narrate the difficulty of breaking the circulate cipher (wherein "breaking" manner being able to are expecting the unseen keystream with a achievement charge better than can be done by way of guessing) to fixing some hard problem. This complexitytheoretic technique may be very appealing, however in practice the ciphers which have been developed tend to be alternatively gradual and impractical. The very last approach highlighted by means of Rueppel is that of designing a randomized cipher. Here the goal is to make certain that the cipher is proof against any practical quantity

Question 35. What Is A One-time Pad?

Answer :

A onetime pad, sometimes known as the Vernam cipher, uses a string of bits that is generated absolutely at random. The keystream is the equal duration because the plaintext message and the random string is blended using bitwise exclusiveor with the plaintext to produce the ciphertext. Since the complete keystream is random, an opponent with endless computational assets can most effective wager the plaintext if he sees the ciphertext. Such a cipher is said to provide best secrecy and the analysis of the onetime pad is seen as one of the cornerstones of contemporary cryptography.

While the onetime pad noticed use for the duration of wartime, over diplomatic channels requiring especially excessive protection, the fact that the name of the game key (which may be used simplest once) is as long as the message introduces severe keymanagement troubles. While perfectly secure, the onetime pad is impractical.

Question 36. What Is A Hash Function?

Answer :

A hash feature H is a change that takes a variablesize enter m and returns a fixedsize string, which is known as the hash price h (this is, h = H(m)). Hash functions with simply this assets have a spread of trendy computational uses, but while hired in cryptography the hash capabilities are commonly chosen to have a few extra properties.

The simple requirements for a cryptographic hash function are:

the input may be of any duration,
the output has a hard and fast length,
H(x) is tremendously easy to compute for any given x ,
H(x) is oneway,
H(x) is collisionfree.
A hash feature H is said to be oneway if it's far hard to invert, wherein "hard to invert" approach that given a hash value h, it's far computationally infeasible to locate some enter x such that H(x) = h.

If, given a message x, it's miles computationally infeasible to discover a message y now not same to x such that H(x) = H(y) then H is said to be a weakly collisionfree hash feature.

A strongly collisionfree hash function H is one for which it's miles computationally infeasible to locate any  messages x and y such that H(x) = H(y).

Jenkins Interview Questions
Question 37. What Is A Birthday Attack?

Answer :

A birthday assault is a call used to consult a category of bruteforce assaults. It receives its name from the unexpected result that the probability that two or extra people in a collection of 23 share the identical birthday is extra than 1/2? such a result is called a birthday paradox.

If some feature, when furnished with a random enter, returns one of k equallylikely values, then by way of time and again evaluating the characteristic for exceptional inputs, we expect to reap the equal output after approximately 1.2k1/2. For the above birthday paradox, update okay with 365.

Question 38. How Does The Length Of A Hash Value A Effect Security?

Answer :

The essential cryptographic residences of a hash feature are that it's miles both oneway and collisionfree.

The most fundamental assault we might mount on a hash function is to select inputs to the hash feature at random till both we find some input a good way to deliver us the target output price we are looking for (thereby contradicting the oneway assets), or we discover two inputs that produce the identical output (thereby contradicting the collisionfree property).

Suppose the hash feature produces an nbit long output. If we're trying to find some enter so as to produce a few goal output cost y, then for the reason that every output is similarly probably we assume to ought to strive 2n feasible enter values.

Question 39. What Is A Compression Function?

Answer :

Damg'rd and Merkle greatly motivated cryptographic hash function design by using defining a hash characteristic in phrases of what's called a compression feature. A compression feature takes a hard and fast duration enter and returns a shorter, fixedlength output. Then a hash feature may be described by means of repeated packages of the compression function till the whole message has been processed. In this manner, a message of arbitrary duration is damaged into blocks of a certain duration which depends on the compression characteristic, and "padded" (for security reasons) so that the dimensions of the message is a more than one of the block size. The blocks are then processed sequentially, taking as enter the result of the hash thus far and the modern message block, with the final output being the hash price for the message.

Question forty. What Are Pseudo-collisions?

Answer :

Pseudocollisions are collisions for the compression function that lies on the heart of an iterative hash characteristic. While collisions for the compression function of a hash feature is probably useful in building collisions for the hash characteristic itself, this is not normally the case. While pseudocollisions is probably considered as an unlucky assets of a hash function, a pseudocollision isn't always equal to a collision, and the hash function can nevertheless be comfortable. MD5 is an instance of a hash characteristic for which pseudocollisions had been located and but remains considered relaxed.

Software Development Lifecycle (SDLC) Interview Questions
Question forty one. What Is The Secure Hash Algorithm (sha And Sha-1)?

Answer :

The Secure Hash Algorithm (SHA), the set of rules specific in the Secure Hash Standard (SHS), changed into advanced with the aid of NIST and published as a federal statistics processing popular (FIPS PUB one hundred eighty). SHA1 became a revision to SHA that changed into published in 1994. The revision corrected an unpublished flaw in SHA. Its design could be very much like the MD4 own family of hash features advanced by Rivest.

Question 42. What Other Hash Functions Are There?

Answer :

For a brief evaluate right here, we notice that hash features are frequently divided into 3 instructions consistent with their design:

those constructed around block ciphers,
those which use modular mathematics,
and people that have what is termed a "committed" design.
By constructing a hash feature round a block cipher, it's far intended that by using using a welltrusted block cipher inclusive of DES a at ease and welltrusted hash feature can be obtained. The socalled DaviesMeyer hash feature is an instance of a hash feature constructed around the use of DES.

SAP Smart Forms Interview Questions
Question 43. What Are Message Authentication Codes (macs)?

Answer :

A message authentication code (MAC) is an authentication tag (also referred to as a checksum) derived via application of an authentication scheme, collectively with a mystery key, to a message. MACs are computed and verified with the identical key with a purpose to simplest be demonstrated via the intended receiver, in contrast to virtual signatures. MACs may be classified as

unconditionally comfy,
hash functionbased,
circulation cipherbased, or
block cipherbased.
Simmons and Stinson proposed an unconditionally at ease MAC this is based on encryption with a onetime pad. The ciphertext of the message authenticates itself, as no one else has get right of entry to to the onetime pad. However, there has to be some redundancy in the message. An unconditionally secure MAC also can be acquired by way of use of a onetime secret key.

Question forty four. What Is Shamirs Secret Sharing Scheme?

Answer :

Shamir's mystery sharing scheme is an interpolating scheme based totally on polynomial interpolation. An (m 1) diploma polynomial over the finite discipline GF(q).

Question 45. What Is Blakleys Secret Sharing Scheme?

Answer :

Blakley's mystery sharing scheme is geometric in nature. The key's a point in an mdimensional space. N stocks are built with each share defining a hyperplane in this space. By finding the intersection of any m of those planes, the secret (or factor of intersection) can be received. This scheme is not perfect, because the person with a percentage of the secret is aware of that the secret is a factor on his hyperplane. Nevertheless, this scheme can be changed to achieve ideal protection.

This is based totally at the scenario in which two shares are required to get better the name of the game. A twodimensional aircraft is used as only two stocks are required to get better the name of the game. The key's a factor in the plane. Each share is a line that passes thru the factor. If any  of the stocks are prepare, the point of intersection, which is the secret, can be effortlessly derived.

Question forty six. What Are Visual Secret Sharing Schemes?

Answer :

Naor and Shamir developed what they known as visible mystery sharing schemes, which might be an exciting visual variation of the ordinary mystery sharing schemes.

Roughly speakme, the hassle can be formulated as follows: There is a secret photo to be shared amongst n participants. The photo is divided into n transparencies (stocks) such that if any m transparencies are placed together, the photo will become visible, but if fewer than m transparencies are located together, not anything can be visible. Such a scheme is built by viewing the secret picture as a fixed of black and white pixels and handling every pixel one at a time. See for more details.

The schemes are flawlessly at ease and easily applied with none cryptographic computation.

A similarly improvement allows each transparency (share) to be an innocent photo (e.G. A photo of a panorama or a picture of a constructing), hence concealing the fact that mystery sharing is taking region.

Question 47. What Are Interactive Proofs And Zero-know-how Proofs?

Answer :

Informally, an interactive proof is a protocol among  events wherein one celebration, known as the prover, tries to prove a sure truth to the othe r celebration, called the verifier. An interactive proof normally takes the form of a challengeresponse protocol, wherein the prover and the verifier trade messages and the verifier outputs either "receive" or "reject" on the give up of the protocol. Besides their theoretical hobbies, interactive proofs have located packages in cryptography and laptop protection such as identity and authentication. In these situations, the truth to be proved is usually related to the prover's identity, e.G., the prover's private key.

The following homes of interactive proofs are quite beneficial, specifically in cryptographic packages:

Completeness: The verifier continually accepts the proof if the prover is aware of the reality and both the prover and the verifier comply with the protocol.

Soundness: The verifier always rejects the proof if the prover does now not realize the truth, so long as the verifier follows the protocol.

Zero information: The verifier learns not anything approximately the reality being proved (besides that it's miles correct) from the prover that he could not already study without the prover. In a zeroknowledge proof, the verifier can not even later show the truth to everybody else.

A common spherical in a zeroknowledge proof includes a "dedication" message from the prover, observed by using a challenge from the verifier, after which a response to the challenge from the prover. The protocol can be repeated for lots rounds. Based on the prover's responses in all of the rounds, the verifier makes a decision whether or not to simply accept or reject the evidence.

Question forty eight. How Do Digital Timestamps Support Digital Signatures?

Answer :

Consider  questions that can be asked through a laptop consumer as she or he views a virtual record or on-line record.

Who is the author of this report who wrote it, permitted it, or consented to it?
When become this report created or remaining modified?
In each instances, the query is one approximately exactly this recordexactly this collection of bits whether it changed into first stored in this pc or changed into created somewhere else and then copied and saved right here. An solution to the first query tells who & what: who accredited exactly what's on this file? An solution to the second query tells when & what: when exactly did the contents of this document first exist?

Both of the above questions have correct answers. A device for answering the primary query is called a digital signature scheme. Such a device become first proposed in and there's a huge style of prevalent designs for an implementation of this type of device.

Question forty nine. What Is Dna Computing?

Answer :

DNA computing, also known as molecular computing, is a brand new technique to hugely parallel computation primarily based on groundbreaking work by using Adleman. He used DNA to clear up a sevennode Hamiltonian course hassle, a special case of an NPcomplete trouble that attempts to go to every node in a graph precisely as soon as. (This unique case is trivial to clear up with a traditional computer, or even by way of hand, but illustrates the ability of DNA computing.)

A DNA pc is largely a collection of particularly selected DNA strands whose mixtures will result in the answer to some trouble. Technology is currently to be had both to pick the preliminary strands and to filter the very last answer. The promise of DNA computing is huge parallelism: with a given setup and enough DNA, possible potentially resolve large issues by means of parallel seek. This may be lots quicker than a traditional pc, for which huge parallelism would require large quantities of hardware, now not genuinely more DNA.

Question 50. What Is The Quantum Cryptography?

Answer :

Quantum cryptography is a method for at ease key alternate over an insecure channel based totally on the character of photons. Photons have a polarization, which may be measured in any basis, where a basis consists of  instructions orthogonal to each different. If a photon's polarization is study within the identical foundation twice, the polarization might be study successfully and could continue to be unchanged. If it's miles read in  unique bases, a random solution might be received within the second foundation, and the polarization inside the preliminary foundation could be modified randomly.

The following protocol may be used by Alice and Bob to exchange mystery keys.

Alice sends Bob a circulate of photons, every with a random polarization, in a random foundation. She facts the polarizations.

Bob measures each photon in a randomly selected foundation and facts the results.

Bob publicizes, over an authenticated however no longer necessarily personal channel (e.G., by cellphone), which basis he used for each photon.

Alice tells him which picks of bases are correct.