APC811S - APPLIED CRYPTOGRAPHY - 2ND OPP - JULY 2024


APC811S - APPLIED CRYPTOGRAPHY - 2ND OPP - JULY 2024



1 Page 1

▲back to top


nAmlBIA un1VERSITY
OF SCIEnCE Ano TECHnOLOGY
FACULTYOF COMPUTING AND INFORMATICS
DEPARTMENTOF CYBERSECURITY
QUALIFICATION:BACHELOROF COMPUTERSCIENCE(HONS INFORMATION SECURITY)
QUALIFICATIONCODE: 08 BHIF
LEVEL:8
COURSE:APPLIEDCRYPTOGRAPHY
COURSECODE: APC811S
DATE: JULY2024
SESSION: THEORY
DURATION: 2 HOURS30 MINUTES
MARKS: 80
SECONDOPPORTUNITY/ SUPPLEMENTARYEXAMINATION QUESTIONPAPER
EXAMINER(S)
PROFATTLEEM. GAMUNDANI
MODERATOR:
MR STANFORDMUSARURWA
THIS QUESTIONPAPERCONSISTSOF 2 PAGES
(Excluding this front page)
INSTRUCTIONS
1. Answer ALL the questions.
2. Write clearly and neatly.
3. In answering questions, be guided by the allocated marks.
4. Number your answers following the numbering used in this question
paper.
1. None
PERMISSIBLEMATERIALS

2 Page 2

▲back to top


Question 1: Overview of Cryptography
(a) Discussthe role of cryptography in enforcing data protection laws such as the
General Data Protection Regulation (GDPR)or the Data Protection Bill in
Namibia.
[2 marks]
(b) How does cryptography aid in compliance with these regulations, and what are
the potential challenges or limitations?
[8 marks}
Question2: Mathematical Foundationsof Cryptography
(a) Describe the role of elliptic curve cryptography (ECC)in securing mobile
devices.
(2 marks]
(b) Compare its efficiency and security level to RSA'sin this specific application.
[8 marks]
Question3: SymmetricKeyCryptography
Evaluate the security and performance implications of using block cipher modes of
operation, such as CBCand GCM, in network security protocols.
[10 marks]
Question4: AsymmetricKeyCryptography
Explain the concept of public key infrastructure (PKI) and how it supports digital
signatures and certificates in e-commerce transactions.
(10 marks]
Question5: HashFunctionsand DigitalSignatures
(a) Explain the process of generating and verifying a digital signature using the
ECDSAalgorithm.
[7 marks]
(b) Discussits application in cryptocurrency transactions.
[3 marks]
Page 2

3 Page 3

▲back to top


Question6: CryptographicProtocols
Describe the SSL/TLShandshake process and how it ensures secure web browsing.
Include in your discussion the roles of asymmetric and symmetric encryption in this
process.
[10 marks]
Question7: AdvancedTopics
(a) Explain the threat of quantum computers to current cryptographic algorithms.
[3 marks]
(b) Discuss post-quantum cryptography and its importance in future-proofing
cryptographic practices.
[7 marks]
Question8: Applicationsof Cryptography
(a) Evaluate the role of cryptography in loT devices.
[1 mark]
(b) Discussthe challenges and propose solutions for implementing cryptographic
security in resource-constrained environments.
[9 marks.}
*****ENDOFEXAMINATIOPNAPER*****
Page 3